Browse Results

Showing 23,176 through 23,200 of 54,343 results

Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11260)

by Eric Luiijf Inga Žutautaitė Bernhard M. Hämmerli

This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures.

New Developments and Advances in Robot Control (Studies in Systems, Decision and Control #175)

by Nabil Derbel Jawhar Ghommam Quanmin Zhu

This book highlights relevant studies and applications in the area of robotics, which reflect the latest research, from interdisciplinary theoretical studies and computational algorithm development, to representative applications. It presents chapters on advanced control, such as fuzzy, neural, backstepping, sliding mode, adaptive, predictive, diagnosis and fault tolerant control etc. and addresses topics including cloud robotics, cable-driven robots, two-wheeled robots, mobile robots, swarm robots, hybrid vehicle, and drones. Each chapter employs a uniform structure: background, motivation, quantitative development (equations), case studies/illustration/tutorial (simulations, experiences, curves, tables, etc.), allowing readers to easily tailor the techniques to their own applications.

Innovations in Soft Computing and Information Technology: Proceedings of ICEMIT 2017, Volume 3

by Jayeeta Chattopadhyay Rahul Singh Vandana Bhattacherjee

The book presents innovative scientific research works by academics, research scholars and students, presented at the 2017 International Conference on Energy, Materials and Information Technology at Amity University Jharkhand, India. It includes contributions on system solutions based on soft computing techniques, and covers innovative soft computing techniques and tools with advanced applications. A major focus of the book is on presenting interdisciplinary problems and how they can be solved using information technology, together with innovative connections to other disciplines. It also includes papers on cloud computing and WSN-related real-time research.

High Performance Computing: 33rd International Conference, Isc High Performance 2018, Frankfurt, Germany, June 24-28, 2018, Proceedings (Lecture Notes in Computer Science #10876)

by Rio Yokota Michèle Weiland John Shalf Sadaf Alam

This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; Performance Analysis and Tools; Exascale Networks; Parallel Algorithms.

Learning on the Go: How to Personalize Education with the iPad (CAST Skinny Books)

by Luis F. Perez

The iPad is a powerful educational device—versatile, mobile, flexible, and accessible to all learners, including those with disabilities. A huge number of up-to-date applications exponentially lift its value as a teaching and learning tool. In Learning on the Go: How to Personalize Education with the iPad, Luis F. Pérez provides savvy tips and strategies to turn the iPad’s transformative potential into effective classroom practice.

Broadcasting, Cable, The Internet, And Beyond: An Introduction To Modern Electronic Media

by Joseph R. Dominick Barry L. Sherman Fritz J. Messere

This survey of the field of modern electronic media includes the new technologies, regulations, programming, and competition that affect our world and the broadcasting industry. The text conveys the excitement of the industry in a highly accessible style that makes even the most difficult information understandable.

Adobe Flash CS6: Creative Cloud Revealed Update

by James E. Shuman

Your Adobe Creative Cloud package includes two components: 1) Online access to Adobe Creative Cloud updates on your CourseMate product, and 2) the CS6 edition of your Adobe book. CourseMate enriches your learning with thorough, chapter-by-chapter summaries of the new Adobe Creative Cloud release. Author-created video introductions cover each chapter's learning objectives, emphasizing their importance for the contemporary design professional. Flashcards, quizzes, and games are also included. Your printed book covers fundamental concepts, starting with the workspace and proceeding logically and intuitively to more advanced topics. Step-by-step tutorials and user-friendly design result in a resource that is comprehensive, clear, and effective. Contact your Learning Consultant to learn more about how CourseMate can enhance the way you teach and your students learn. The online Creative Cloud content updates are for the June 2013 release of Adobe Creative Cloud.

Adobe Audition CC

by Adobe Creative Team

The fastest, easiest, most comprehensive way to learn Adobe Audition CC Classroom in a Book®, the best-selling series of hands-on software training workbooks, offers what no other book or training program does--an official training series from Adobe Systems Incorporated, developed with the support of Adobe product experts. Adobe Audition CC Classroom in a Book contains 15 lessons (and one bonus lesson on www.peachpit.com) that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, go to www.peachpit.com/redeem and redeem the unique code provided inside this book. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-bystep instructions, and the project files forthe students." Barbara Binder, Adobe Certified Instructor Rocky Mountain Training

CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003

by Jeff T. Parker Michael Gregg

Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the exam objectives, this book provides expert walk-through of essential security concepts and processes to help you tackle this challenging exam with full confidence. Practical examples and real-world insights illustrate critical topics and show what essential practices look like on the ground, while detailed explanations of technical and business concepts give you the background you need to apply identify and implement appropriate security solutions. End-of-chapter reviews help solidify your understanding of each objective, and cutting-edge exam prep software features electronic flashcards, hands-on lab exercises, and hundreds of practice questions to help you test your knowledge in advance of the exam. The next few years will bring a 45-fold increase in digital data, and at least one third of that data will pass through the cloud. The level of risk to data everywhere is growing in parallel, and organizations are in need of qualified data security professionals; the CASP+ certification validates this in-demand skill set, and this book is your ideal resource for passing the exam. Master cryptography, controls, vulnerability analysis, and network security Identify risks and execute mitigation planning, strategies, and controls Analyze security trends and their impact on your organization Integrate business and technical components to achieve a secure enterprise architecture CASP+ meets the ISO 17024 standard, and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is also compliant with government regulations under the Federal Information Security Management Act (FISMA). As such, this career-building credential makes you in demand in the marketplace and shows that you are qualified to address enterprise-level security concerns. The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, is the preparation resource you need to take the next big step for your career and pass with flying colors.

Microsoft Project 2019 For Dummies

by Cynthia Snyder Dionisio

Keep projects on track Microsoft Project 2019 is a powerhouse project management, portfolio management, and resource management tool. Whether you’re a full-time project manager or manage projects as part of a larger set of duties, Microsoft Project 2019 For Dummies will get you thinking and operating at the level of a project management guru. Written by a noted project management pro, this book covers the ins and outs of Microsoft Project. Throughout the book, you’ll find project management best practices and tips for keeping any project on schedule and under budget. Reference the full set of Microsoft Project 2019 features Learn to think like a project management professional Get into the nuts and bolts of Project for better productivity Create a task schedule that keeps a project moving Identify the golden rules that keep projects on track With Microsoft Project 2019 For Dummies, you’ll soon get a grip on all the powerful features of this popular project management software. No matter your level of training or experience, this book will show you how improve your project management with Microsoft Project 2019.

iPhone: The book that should have been in the box

by David Pogue

The iPhone XS, XS Max, and XR aren’t just faster and more powerful than ever—they’re also better at all of the things you use an iPhone for. With the latest edition of this bestselling guide, you get a funny, gorgeously illustrated guide to the tips, shortcuts, and workarounds that will turn you into an iPhone master. This easy-to-use book will also get you up to speed on all iOS 12 features, including new Siri shortcuts, Group FaceTime, and improved parental controls.Missing Manual series creator and former New York Times columnist David Pogue helps you accomplish everything from web browsing to watching videos. You’ll get up to speed on features such as Dual SIM Support that lets you use two lines on one phone and True Tone technology that adjusts the display to your environment. Pick up this beautiful full-color book and learn how to get the most out of your iPhone.

Practical Application Development with AppRun: Building Reliable, High-Performance Web Apps Using Elm-Inspired Architecture, Event Pub-Sub, and Components

by Yiyi Sun

Explore the concepts, patterns, and architecture behind AppRun applications. With this end-to-end guide, you will be able to build web apps fast to the market with the low learning curve and high development productivity. You will learn how to break down the application logic into three decoupled parts: state, view, and update. You will then see how to connect web page events to the AppRun event life-cycle, route user interactions, access data from the remote servers, compose the user interface using components, and integrate 3rd party libraries. Following examples of various apps, such as the counter app, to-do app, weather app, hacker news reader app, and blog app, you will have all the techniques for developing your AppRun apps including the line of business apps. You will also review wider development concepts such as using strongly typed states practically, unit testing strategies for app state changes, time travel debugging, async web API invocation, server-side virtual DOM, module compilation optimization, the developer tools, and more.What You'll LearnUse AppRun to develop web apps end-to-endUnderstand the technology behind AppRunEvaluate and compare architecture designDevelop applications using Elm architecture, event publication and subscription, and components. Who This Book Is For Web app developers and architects; useful for beginners learning front-end development and more experienced developers interested in learning about AppRun and modern development concepts and principles more generally

Computational Phonogram Archiving (Current Research in Systematic Musicology #5)

by Rolf Bader

The future of music archiving and search engines lies in deep learning and big data. Music information retrieval algorithms automatically analyze musical features like timbre, melody, rhythm or musical form, and artificial intelligence then sorts and relates these features. At the first International Symposium on Computational Ethnomusicological Archiving held on November 9 to 11, 2017 at the Institute of Systematic Musicology in Hamburg, Germany, a new Computational Phonogram Archiving standard was discussed as an interdisciplinary approach. Ethnomusicologists, music and computer scientists, systematic musicologists as well as music archivists, composers and musicians presented tools, methods and platforms and shared fieldwork and archiving experiences in the fields of musical acoustics, informatics, music theory as well as on music storage, reproduction and metadata. The Computational Phonogram Archiving standard is also in high demand in the music market as a search engine for music consumers. This book offers a comprehensive overview of the field written by leading researchers around the globe.

Microsoft 365 Business for Admins For Dummies

by Jennifer Reed

Learn streamlined management and maintenance capabilities for Microsoft 365 Business If you want to make it easy for your teams to work together using the latest productivity solutions with built-in security—while saving thousands of dollars in implementing the solution—you've picked the right book. Inside, you'll gain an understanding of Microsoft 365 Business, a complete integrated solution for business productivity and security powered by Office 365 and Windows 10. You’ll also learn how this cloud-based solution can help grow your business while protecting company data from potential threats using the same security management tools large enterprises use. Microsoft 365 Business For Admins For Dummies provides business owners, IT teams, and even end users an understanding of the capabilities of Microsoft 365 Business: an integrated platform and security solution built with the latest features to enable today's modern workforce and empower businesses to achieve their goals. De-mystifies the complexities of the bundled solution to help you avoid common deployment pitfalls Includes the latest information about the services included in Microsoft 365 Business Enhance team collaboration with intelligent tools Manage company-owned or bring your own device (BYOD) devices from one portal Step through a guided tour for running a successful deployment Get the guidance you need to deploy Microsoft 365 Business and start driving productivity in your organization while taking advantage of the built-in security features in the solution to grow and protect your business today.

Fog Computing, Deep Learning and Big Data Analytics-Research Directions

by C.S.R. Prabhu

This book provides a comprehensive picture of fog computing technology, including of fog architectures, latency aware application management issues with real time requirements, security and privacy issues and fog analytics, in wide ranging application scenarios such as M2M device communication, smart homes, smart vehicles, augmented reality and transportation management. This book explores the research issues involved in the application of traditional shallow machine learning and deep learning techniques to big data analytics. It surveys global research advances in extending the conventional unsupervised or clustering algorithms, extending supervised and semi-supervised algorithms and association rule mining algorithms to big data Scenarios. Further it discusses the deep learning applications of big data analytics to fields of computer vision and speech processing, and describes applications such as semantic indexing and data tagging. Lastly it identifies 25 unsolved research problems and research directions in fog computing, as well as in the context of applying deep learning techniques to big data analytics, such as dimensionality reduction in high-dimensional data and improved formulation of data abstractions along with possible directions for their solutions.

Webservices: Theory and Practice

by Hrushikesha Mohanty Prasant Kumar Pattnaik

This book focuses on web service specification, search, composition, validation, resiliency, security and engineering, and discusses various service specification standards like WSDL, SAWSDL, WSMO and OWLS. The theory and associated algorithms for service specification verification are detailed using formal models like Petrinet, FSM and UML. The book also explores various approaches proposed for web service search and composition, highlighting input/output, parameter-based search, and selection of services based on both functional and non-functional parameters. In turn, it examines various types of composite web services and presents an overview of popular fault handling strategies for each of these types. Lastly, it discusses the standards used for implementing web service security on the basis of a case study, and introduces the Web Service Development Life Cycle (WSDLC), which defines co-operation between several industry partners to develop web services in a more structured way.

Unjust: Social Justice and the Unmaking of America

by Noah Rothman

"An elegant and thoughtful dismantling of perhaps the most dangerous ideology at work today." — BEN SHAPIRO, bestselling author and host of "The Ben Shapiro Show" "Reading Noah Rothman is like a workout for your brain." — DANA PERINO, bestselling author and former press secretary to President George W. Bush There are just two problems with “social justice”: it’s not social and it’s not just. Rather, it is a toxic ideology that encourages division, anger, and vengeance. In this penetrating work, Commentary editor and MSNBC contributor Noah Rothman uncovers the real motives behind the social justice movement and explains why, despite its occasionally ludicrous public face, it is a threat to be taken seriously. American political parties were once defined by their ideals. That idealism, however, is now imperiled by an obsession with the demographic categories of race, sex, ethnicity, and sexual orientation, which supposedly constitute a person’s “identity.” As interest groups defined by identity alone command the comprehensive allegiance of their members, ordinary politics gives way to “Identitarian” warfare, each group looking for payback and convinced that if it is to rise, another group must fall. In a society governed by “social justice,” the most coveted status is victimhood, which people will go to absurd lengths to attain. But the real victims in such a regime are blind justice—the standard of impartiality that we once took for granted—and free speech. These hallmarks of American liberty, already gravely compromised in universities, corporations, and the media, are under attack in our legal and political systems.

On the Cognitive, Ethical, and Scientific Dimensions of Artificial Intelligence: Themes from IACAP 2016 (Philosophical Studies Series #134)

by Don Berkich Matteo Vincenzo D'Alfonso

This edited volume explores the intersection between philosophy and computing. It features work presented at the 2016 annual meeting of the International Association for Computing and Philosophy. The 23 contributions to this volume neatly represent a cross section of 40 papers, four keynote addresses, and eight symposia as they cut across six distinct research agendas. The volume begins with foundational studies in computation and information, epistemology and philosophy of science, and logic. The contributions next examine research into computational aspects of cognition and philosophy of mind. This leads to a look at moral dimensions of man-machine interaction as well as issues of trust, privacy, and justice. This multi-disciplinary or, better yet, a-disciplinary investigation reveals the fruitfulness of erasing distinctions among and boundaries between established academic disciplines. This should come as no surprise. The computational turn itself is a-disciplinary and no former discipline, whether scientific, artistic, or humanistic, has remained unchanged. Rigorous reflection on the nature of these changes opens the door to inquiry into the nature of the world, what constitutes our knowledge of it, and our understanding of our place in it. These investigations are only just beginning. The contributions to this volume make this clear: many encourage further research and end with open questions.

Business Process Management Workshops: Bpm 2018 International Workshops Sydney, NSW, Australia, September 9–14, 2018, Revised Papers (Lecture Notes in Business Information Processing #342)

by Florian Daniel Quan Z. Sheng Hamid Motahari

This book constitutes revised papers from the eight International Workshops held at the 16th International Conference on Business Process Management, BPM 2018, in Sydney, Australia, in September 2018: BPI 2018: 14th International Workshop on Business Process Intelligence; BPMS2 2018: 11th Workshop on Social and Human Aspects of Business Process Management;‐ PODS4H 2018: 1st International Workshop on Process-Oriented Data Science for Healthcare; AI4BPM 2018: 1st International Workshop on Artificial Intelligence for Business Process Management; CCBPM 2018: 1st International Workshop on Emerging Computing Paradigms and Context in Business Process Management; BP-Meet-IoT / PQ 2018: Joint Business Processes Meet the Internet-of-Things and Process Querying Workshop; DeHMiMoP 2018: 1st Declarative/Decision/Hybrid Mining and Modelling for Business Processes Workshop; REBM /EdForum 2018: Joint Requirements Engineering and Business Process Management Workshop and Education Forum The 45 full papers presented in this volume were carefully reviewed and selected from 90 submissions.

Predictive Analytics And Data Mining: Concepts And Practice With Rapidminer

by Vijay Kotu Bala Deshpande

Put Predictive Analytics into Action Learn the basics of Predictive Analysis and Data Mining through an easy to understand conceptual framework and immediately practice the concepts learned using the open source RapidMiner tool. Whether you are brand new to Data Mining or working on your tenth project, this book will show you how to analyze data, uncover hidden patterns and relationships to aid important decisions and predictions. Data Mining has become an essential tool for any enterprise that collects, stores and processes data as part of its operations. This book is ideal for business users, data analysts, business analysts, business intelligence and data warehousing professionals and for anyone who wants to learn Data Mining. You'll be able to: 1. Gain the necessary knowledge of different data mining techniques, so that you can select the right technique for a given data problem and create a general purpose analytics process. 2. Get up and running fast with more than two dozen commonly used powerful algorithms for predictive analytics using practical use cases. 3. Implement a simple step-by-step process for predicting an outcome or discovering hidden relationships from the data using RapidMiner, an open source GUI based data mining tool Predictive analytics and Data Mining techniques covered: Exploratory Data Analysis, Visualization, Decision trees, Rule induction, k-Nearest Neighbors, Na ve Bayesian, Artificial Neural Networks, Support Vector machines, Ensemble models, Bagging, Boosting, Random Forests, Linear regression, Logistic regression, Association analysis using Apriori and FP Growth, K-Means clustering, Density based clustering, Self Organizing Maps, Text Mining, Time series forecasting, Anomaly detection and Feature selection. Implementation files can be downloaded from the book companion site at www.LearnPredictiveAnalytics.com Demystifies data mining concepts with easy to understand language Shows how to get up and running fast with 20 commonly used powerful techniques for predictive analysis Explains the process of using open source RapidMiner tools Discusses a simple 5 step process for implementing algorithms that can be used for performing predictive analytics Includes practical use cases and examples

Social Media Marketing for the Future: Strategies for 2020 and Beyond

by J. E. Ford

<p>Social media marketing is not an option anymore. Your customers—no matter who they are—expect you to reach them the way they communicate. The vast majority of companies have inadequate social media marketing strategies. Most companies are playing catch-up with current digital marketing trends and their strategies will be outdated by the time the company has mastered them. <p>To successfully market on social media, you need to be prepared for the future. Social media changes rapidly and frequently. <p>This book will teach you: <p> <li>The most important social media trends to expect for the next years and beyond <li>How to apply perennial marketing principles to new mediums and technologies <li>How to understand and reach new customer profiles and the new generation of social media: Gen Z <li>New government regulation and privacy trends that will affect your marketing efforts</li> <p> <p>This book discusses: <p> <li>The future of Facebook, Instagram, Twitter, Snapchat, YouTube and more, and how to harness their power to build your brand and gain customers <li>New social networks that are on the rise and may become major contenders <li>Technological trends that are redefining the rhythm of social media <li>How to utilize new technology and tools to strengthen your brand and achieve a competitive edge.</li> <p> <p>If your marketing plan is focused only on today’s trends, you’ve already lost. Plan for tomorrow. Beat out the competition. Reach your customers where they are. <p>The future is here. Are you ready?</p>

The Selfie Generation: How Our Self-Images Are Changing Our Notions of Privacy, Sex, Consent, and Culture

by Alicia Eler

<p>Whether it's Kim Kardashian uploading picture after picture to Instagram or your roommate posting a mid-vacation shot to Facebook, selfies receive mixed reactions. But are selfies more than, as many critics lament, a symptom of a self-absorbed generation? <p>Millennial Alicia Eler's The Selfie Generation is the first book to delve fully into this ubiquitous and much-maligned part of social media, including why people take them in the first place and the ways they can change how we see ourselves. Eler argues that selfies are just one facet of how we can use digital media to create a personal brand in the modern age. More than just a picture, they are an important part of how we live today. <p>Eler examines all aspects of selfies, online social networks, and the generation that has grown up with them. She looks at how the boundaries between people’s physical and digital lives have blurred with social media; she explores questions of privacy, consent, ownership, and authenticity; and she points out important issues of sexism and double standards wherein women are encouraged to take them but then become subject to criticism and judgment. Alicia discusses the selfie as a paradox—both an image with potential for self-empowerment, yet also a symbol of complacency within surveillance culture The Selfie Generation explores just how much social media has changed the ways that people connect, communicate, and present themselves to the world.</p>

Computer Vision – ECCV 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11130)

by Laura Leal-Taixé Stefan Roth

The six-volume set comprising the LNCS volumes 11129-11134 constitutes the refereed proceedings of the workshops that took place in conjunction with the 15th European Conference on Computer Vision, ECCV 2018, held in Munich, Germany, in September 2018. 43 workshops from 74 workshops proposals were selected for inclusion in the proceedings. The workshop topics present a good orchestration of new trends and traditional issues, built bridges into neighboring fields, and discuss fundamental technologies and novel applications.

Information, Communication and Computing Technology: Third International Conference, ICICCT 2018, New Delhi, India, May 12, 2018, Revised Selected Papers (Communications in Computer and Information Science #835)

by Sonajharia Minz Sushanta Karmakar Latika Kharb

This book constitutes the refereed proceedings of the Third International Conference on Information, Communication and Computing Technology, ICICCT 2018, held in New Delhi, India, in May 2018. The 18 revised full papers presented in this volume were carefully reviewed and selected from 295 submissions. The papers are organized in topical sections on communication and network systems and emerging computing technologies.

Resilience of Cyber-Physical Systems: From Risk Modelling To Threat Counteraction (Advanced Sciences and Technologies for Security Applications)

by Francesco Flammini

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs’ exposure to new threats, and CPSs’ potential to counteract them. Further, the chapters address topics ranging from risk modeling to threat management and mitigation. The book offers a clearly structured, highly accessible resource for a diverse readership, including graduate students, researchers and industry practitioners who are interested in evaluating and ensuring the resilience of CPSs in both the development and assessment stages. Foreword by Prof. Shiyan Hu, Chair of Cyber-Physical Systems at Linnaeus University, Sweden.

Refine Search

Showing 23,176 through 23,200 of 54,343 results