Browse Results

Showing 24,276 through 24,300 of 54,499 results

The Flip Side of Free: Understanding the Economics of the Internet

by Michael Kende

Why "free" comes at a price: the costs of free internet services in terms of privacy, cybersecurity, and the growing market power of technology giants.The upside of the internet is free Wi-Fi at Starbucks, Facetime over long distances, and nearly unlimited data for downloading or streaming. The downside is that our data goes to companies that use it to make money, our financial information is exposed to hackers, and the market power of technology companies continues to increase. In The Flip Side of Free, Michael Kende shows that free internet comes at a price. We're beginning to realize this. Our all-purpose techno-caveat is "I love my smart speaker...but"--is it really tracking everything I do? listening to everything I say?

Adobe Dreamweaver CC: The Professional Portfolio (2017 Release)

by Erika Kendra

The projects in this book reflect a range of different types of Dreamweaver jobs, from organizing a client's site and links to developing a functional site template to building a dynamic site. When you finish the eight projects in this book, you will have a substantial body of work that should impress any potential employer.

Computational Economics

by David A. Kendrick P. Ruben Mercado Hans M. Amman

The ability to conceptualize an economic problem verbally, to formulate it as a mathematical model, and then represent the mathematics in software so that the model can be solved on a computer is a crucial skill for economists. Computational Economics contains well-known models--and some brand-new ones--designed to help students move from verbal to mathematical to computational representations in economic modeling. The authors' focus, however, is not just on solving the models, but also on developing the ability to modify them to reflect one's interest and point of view. The result is a book that enables students to be creative in developing models that are relevant to the economic problems of their times. Unlike other computational economics textbooks, this book is organized around economic topics, among them macroeconomics, microeconomics, and finance. The authors employ various software systems--including MATLAB, Mathematica, GAMS, the nonlinear programming solver in Excel, and the database systems in Access--to enable students to use the most advantageous system. The book progresses from relatively simple models to more complex ones, and includes appendices on the ins and outs of running each program. The book is intended for use by advanced undergraduates and professional economists and even, as a first exposure to computational economics, by graduate students. Organized by economic topics Progresses from simple to more complex models Includes instructions on numerous software systems Encourages customization and creativity

Cyber Risks for Business Professionals

by Rupert Kendrick

Realise the benefits of Internet technologies, while ensuring your company is protected from the associated risks!An effective risk management strategy is vital to your company's survival Internet technologies have revolutionised the way that business is conducted. However, these innovations expose your business to various risks. Inadequate security can lead to the theft of customer data and, in the event of technological failure or a cyberattack, your business could lose its ability to function altogether. An effective risk management strategy is, therefore, vital to your company's survival. Understand the origins of cyber risks and develop suitable strategies for their management Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject. Expert guidance examining the operational and technological risks Drawing on interviews with experts from Clifford Chance, Capgemini and Morgan Stanley amongst others, the book examines the operational and technological risks alongside the legal and compliance issues. This book will be invaluable to lawyers and accountants, as well as to company directors and business professionals. Benefits to business include: * Understand and manage the technological risks This book looks at the security issues surrounding Cloud computing, and highlights the problems that have arisen as a result of the use of laptop computers and memory sticks for remote working. Implementing a risk management framework will offer reassurance to your existing customers and improve your chances of winning new business. * Familiarise yourself with the legal issues You need to be aware of the laws that govern your activities when you do business online. The author offers you a guide to the most important aspects of IT law, and outlines the implications of recent legislation. The author also looks at the compliance requirements of PCI DSS (the Payment Card Industry Data Security Standard). * Control employee use of Web 2. 0 technologies While sites such as Facebook and LinkedIn help people to develop business contacts, employee misuse of social networking sites also causes problems, ranging from damage to the company's reputation to breaches of commercial confidentiality. This book offers advice on the right policy to adopt to ensure your staff use Web 2. 0 technologies responsibly. * Use technology to address the risks This book introduces you to IT solutions that you can deploy to improve your information security, such as encryption and digital watermarking. It also looks at how you can monitor and control e-mail to prevent the leaking of sensitive information.

Outsourcing IT: A Governance Guide

by Rupert Kendrick

"Outsourcing IT - A Governance Guide" addresses three componentsof the governance of IT outsourcing: the IT outsourcing process;the nature of governance and the use of methodologies and toolsfor the implementation of governance principles; and, themanagement of risk within the IT outsourcing process. Theobjectives of the book are first, to provide boards of directorswith clear criteria for the application of governance principlesin an IT outsourcing environment; and, second, to provideguidance on useful strategies, processes and procedures for theirimplementation. The author, Rupert Kendrick, is a non-practisingsolicitor and, for many years, was a partner in a medium-sizedlaw firm. He has written, trained and consulted widely in thelegal profession on legal IT issues.

How to Manage Complex Programs: High-Impact Techniques for Handling Project Workflow, Deliverables, and Teams

by Tom Kendrick

Program manager--it's one of the most challenging jobs you can have. Overseeing and coordinating multiple project teams and thousands of activities may seem a Herculean task, but it's easier with the right tools in hand.Successful program management begins with a good command of project management processes, but these are never sufficient. Once a program exceeds a certain scale, project processes become unwieldy. To see a program successfully through to completion, you must break the work down into simpler, smaller pieces and organize it into interdependent tasks.Complete with diagrams, graphs, and real-life examples, How to Manage Complex Programs explains the ins and outs of program management and provides concrete and effective techniques for structuring deliverables, workflow, and staffing. You'll learn to:Decompose complex deliverables into manageable chunksDevelop coherent plans for component projectsHandle cross-project dependenciesOrganize program staff and project leaders into a high-performing teamAnd moreYes, program management is challenging. But with these proven strategies, it can also be highly rewarding--for you and for your organization.

The View from Flyover Country: Dispatches from the Forgotten America

by Sarah Kendzior

From the St. Louis–based journalist often credited with first predicting Donald Trump’s presidential victory."A collection of sharp-edged, humanistic pieces about the American heartland...Passionate pieces that repeatedly assail the inability of many to empathize and to humanize." — KirkusIn 2015, Sarah Kendzior collected the essays she reported for Al Jazeera and published them as The View from Flyover Country, which became an ebook bestseller and garnered praise from readers around the world. Now, The View from Flyover Country is being released in print with an updated introduction and epilogue that reflect on the ways that the Trump presidency was the certain result of the realities first captured in Kendzior’s essays.A clear-eyed account of the realities of life in America’s overlooked heartland, The View from Flyover Country is a piercing critique of the labor exploitation, race relations, gentrification, media bias, and other aspects of the post-employment economy that gave rise to a president who rules like an autocrat. The View from Flyover Country is necessary reading for anyone who believes that the only way for America to fix its problems is to first discuss them with honesty and compassion.“Please put everything aside and try to get ahold of Sarah Kendzior’s collected essays, The View from Flyover Country. I have rarely come across writing that is as urgent and beautifully expressed. What makes Kendzior’s writing so truly important is [that] it . . . documents where the problem lies, by somebody who lives there.”—The Wire“Sarah Kendzior is as harsh and tenacious a critic of the Trump administration as you’ll find. She isn’t some new kid on the political block or a controversy machine. . . .Rather she is a widely published journalist and anthropologist who has spent much of her life studying authoritarianism.” —Columbia Tribune

Process Improvement and CMMI for Systems and Software

by Ron S. Kenett Emanuel Baker

Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software. Focusing on planning, implementation, and management in system and software processes, it supplies a brief overview of basic strategic planning models and covers fundamental concepts and appr

Software Process Quality: Management and Control

by Ron S. Kenett Emanuel Baker

Using actual examples of software process improvement from the private sector and government, this work demonstrates how quality systems, measurement techniques and performance evaluations work. It presents a methodology for analyzing an ongoing software development process and establishing a rational plan for process improvement.

Modern Statistics: A Computer-Based Approach with Python (Statistics for Industry, Technology, and Engineering)

by Ron S. Kenett Shelemyahu Zacks Peter Gedeck

This innovative textbook presents material for a course on modern statistics that incorporates Python as a pedagogical and practical resource. Drawing on many years of teaching and conducting research in various applied and industrial settings, the authors have carefully tailored the text to provide an ideal balance of theory and practical applications. Numerous examples and case studies are incorporated throughout, and comprehensive Python applications are illustrated in detail. A custom Python package is available for download, allowing students to reproduce these examples and explore others.The first chapters of the text focus on analyzing variability, probability models, and distribution functions. Next, the authors introduce statistical inference and bootstrapping, and variability in several dimensions and regression models. The text then goes on to cover sampling for estimation of finite population quantities and time series analysis and prediction, concluding with two chapters on modern data analytic methods. Each chapter includes exercises, data sets, and applications to supplement learning.Modern Statistics: A Computer-Based Approach with Python is intended for a one- or two-semester advanced undergraduate or graduate course. Because of the foundational nature of the text, it can be combined with any program requiring data analysis in its curriculum, such as courses on data science, industrial statistics, physical and social sciences, and engineering. Researchers, practitioners, and data scientists will also find it to be a useful resource with the numerous applications and case studies that are included. A second, closely related textbook is titled Industrial Statistics: A Computer-Based Approach with Python. It covers topics such as statistical process control, including multivariate methods, the design of experiments, including computer experiments and reliability methods, including Bayesian reliability. These texts can be used independently or for consecutive courses.The mistat Python package can be accessed at https://gedeck.github.io/mistat-code-solutions/ModernStatistics/"In this book on Modern Statistics, the last two chapters on modern analytic methods contain what is very popular at the moment, especially in Machine Learning, such as classifiers, clustering methods and text analytics. But I also appreciate the previous chapters since I believe that people using machine learning methods should be aware that they rely heavily on statistical ones. I very much appreciate the many worked out cases, based on the longstanding experience of the authors. They are very useful to better understand, and then apply, the methods presented in the book. The use of Python corresponds to the best programming experience nowadays. For all these reasons, I think the book has also a brilliant and impactful future and I commend the authors for that."Professor Fabrizio RuggeriResearch Director at the National Research Council, ItalyPresident of the International Society for Business and Industrial Statistics (ISBIS)Editor-in-Chief of Applied Stochastic Models in Business and Industry (ASMBI)

Building Secure Cars: Assuring the Automotive Software Development Lifecycle

by Dennis Kengo Oka

Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycle While increased connectivity and advanced software-based automotive systems provide tremendous benefits and improved user experiences, they also make the modern vehicle highly susceptible to cybersecurity attacks. In response, the automotive industry is investing heavily in establishing cybersecurity engineering processes. Written by a seasoned automotive expert with abundant international industry expertise, Building Secure Cars: Assuring the Software Development Lifecycle introduces readers to various types of cybersecurity activities, measures, and solutions that can be applied at each stage in the typical automotive development process. This book aims to assist auto industry insiders build more secure cars by incorporating key security measures into their software development lifecycle. Readers will learn to better understand common problems and pitfalls in the development process that lead to security vulnerabilities. To overcome such challenges, this book details how to apply and optimize various automated solutions, which allow software development and test teams to identify and fix vulnerabilities in their products quickly and efficiently. This book balances technical solutions with automotive technologies, making implementation practical. Building Secure Cars is: One of the first books to explain how the automotive industry can address the increased risks of cyberattacks, and how to incorporate security into the software development lifecycle An optimal resource to help improve software security with relevant organizational workflows and technical solutions A complete guide that covers introductory information to more advanced and practical topics Written by an established professional working at the heart of the automotive industry Fully illustrated with tables and visuals, plus real-life problems and suggested solutions to enhance the learning experience This book is written for software development process owners, security policy owners, software developers and engineers, and cybersecurity teams in the automotive industry. All readers will be empowered to improve their organizations' security postures by understanding and applying the practical technologies and solutions inside.

Developing Games on the Raspberry Pi: App Programming with Lua and LÖVE

by Seth Kenlon

Learn to set up a Pi-based game development environment, and then develop a game with Lua, a popular scripting language used in major game frameworks like Unreal Engine (BioShock Infinite), CryEngine (Far Cry series), Diesel (Payday: The Heist), Silent Storm Engine (Heroes of Might and Magic V) and many others. More importantly, learn how to dig deeper into programming languages to find and understand new functions, frameworks, and languages to utilize in your games.You’ll start by learning your way around the Raspberry Pi. Then you’ll quickly dive into learning game development with an industry-standard and scalable language. After reading this book, you'll have the ability to write your own games on a Raspberry Pi, and deliver those games to Linux, Mac, Windows, iOS, and Android. And you’ll learn how to publish your games to popular marketplaces for those desktop and mobile platforms.Whether you're new to programming or whether you've already published to markets like Itch.io or Steam, this book showcases compelling reasons to use the Raspberry Pi for game development. Use Developing Games on the Raspberry Pi as your guide to ensure that your game plays on computers both old and new, desktop or mobile.What You'll Learn Confidently write programs in Lua and the LOVE game engine on the Raspberry PiResearch and learn new libraries, methods, and frameworks for more advanced programmingWrite, package, and sell apps for mobile platformsDeliver your games on multiple platformsWho This Book Is ForSoftware engineers, teachers, hobbyists, and development professionals looking to up-skill and develop games for mobile platforms, this book eases them into a parallel universe of lightweight, POSIX, ARM-based development.

Joomla! 1.5 Development Cookbook

by James Kennard

This book contains recipes which define common problems and provide suggested solutions. This is not a book to read from cover-to-cover, it is hands-on solutions book that takes a practical approach to recipes - providing code samples that can easily be extracted and modified to suit the needs of the reader. Each recipe is presented as a separate entity and prior reading of other recipes is not required. Chapters provide categorization of recipes and give an introduction to the subject area with reference to the recipes contained within. This book is for PHP developers who have experience of developing for Joomla! It does not introduce developing extensions for Joomla!, it is assumed that the reader has prior knowledge of the subject and is looking for a quick guide to solve common problems quickly which commonly occur when developing for Joomla! It does not matter if you are an accomplished Joomla! developer or just starting out. For each scenario that this book addresses, there is an introductory explanation of the problem and an easy to implement solution. For the more accomplished developers recipes also include a discussion of the solution explaining how it works and how it can be further enhanced or customized.

Joomla! 1.5 Development Cookbook: LITE

by James Kennard

This book is in Packt's Cookbook series. A Packt Cookbook contains recipes for solutions to the most important problems you face when working with a topic. Inside the Cookbook you will find: A straightforward and easy to follow format, A selection of the most important tasks and problems, Carefully organized instructions for solving the problem efficiently, Clear explanations of what you did, Details for applying the solution to other situations.This book is for PHP developers who have spent time attempting to extend or customize Joomla with PHP code. This book has been designed with specific Joomla! development problems in mind, and it is expected that you are comfortable using PHP code to extend and customize Joomla!

Mastering Joomla! 1.5 Extension and Framework Development

by James Kennard

Packed with expert advice and tips, this book is an invaluable reference guide that you will turn to again and again as you work with Joomla! PHP developers who want to understand how Joomla! works with a view to advanced customization or extension development, and want to learn how to work with the Joomla! framework.

Mastering Joomla! 1.5 Extension and Framework Development Second Edition

by James Kennard Chuck Lanham

Packed with expert advice, working examples, and tips, this book is an essential reference guide that you will turn to again and again as you work with Joomla!. PHP developers who want to understand how Joomla! Works, with a view to advanced customization or extension development, and who want to learn how to work with the Joomla! Framework.

HTML & XHTML: The Definitive Guide

by Bill Kennedy Chuck Musciano

"...lucid, in-depth descriptions of the behavior of every HTML tag on every major browser and platform, plus enough dry humor to make the book a pleasure to read." --Edward Mendelson, PC Magazine "When they say 'definitive' they're not kidding." --Linda Roeder, About.com Put everthing you need to know about HTML & XHTML at your fingertips. For nearly a decade, hundreds of thousands of web developers have turned to HTML & XHTML: The Definitive Guide to master standards-based web development. Truly a definitive guide, the book combines a unique balance of tutorial material with a comprehensive reference that even the most experienced web professionals keep close at hand. From basic syntax and semantics to guidelines aimed at helping you develop your own distinctive style, this classic is all you need to become fluent in the language of web design. The new sixth edition guides you through every element of HTML and XHTML in detail, explaining how each element works and how it interacts with other elements. You'll also find detailed discussions of CSS (Cascading Style Sheets), which is intricately related to web page development. The most all-inclusive, up-to-date book on these languages available, this edition covers HTML 4.01, XHTML 1.0, and CSS2, with a preview of the upcoming XHTML2 and CSS3. Other topics include the newer initiatives in XHTML (XForms, XFrames, and modularization) and the essentials of XML for advanced readers. You'll learn how to:Use style sheets to control your document's appearance Work with programmatically generated HTML Create tables, both simple and complex Use frames to coordinate sets of documents Design and build interactive forms and dynamic documents Insert images, sound files, video, Java applets, and JavaScript programs Create documents that look good on a variety of browsers The authors apply a natural learning approach that uses straightforward language and plenty of examples. Throughout the book, they offer suggestions for style and composition to help you decide how to best use HTML and XHTML to accomplish a variety of tasks. You'll learn what works and what doesn't, and what makes sense to those who view your web pages and what might be confusing. Written for anyone who wants to learn the language of the Web--from casual users to the full-time design professionals--this is the single most important book on HTML and XHTML you can own. Bill Kennedy is chief technical officer of MobileRobots, Inc. When not hacking new HTML pages or writing about them, "Dr. Bill" (Ph.D. in biophysics from Loyola University of Chicago) is out promoting the company's line of mobile, autonomous robots that can be used for artificial intelligence, fuzzy logic research, and education. Chuck Musciano began his career as a compiler writer and crafter of tools at Harris Corporations' Advanced Technology Group and is now a manager of Unix Systems in Harris' Corporate Data Center.

The Ultimate Marketing Plan: Target Your Audience! Get Out Your Message! Build Your Brand!

by Dan S. Kennedy

The ultimate, no-nonsense guide to help you market your product, build buzz, and make more money than ever from marketing expert Dan S. Kennedy.Let&’s face it—the business world today is nothing like it was ten years ago. Marketing budgets are tighter, consumers are more skeptical, and social media has changed forever the way we talk to our customers.In this new edition of his bestselling The Ultimate Marketing Plan, industry expert Dan S. Kennedy integrates such tools as social media marketing, networking, and strategic memberships into a complete plan that will strengthen your customer base without breaking your budget.Packed with updated examples, marketing techniques, and contributions from experts, Kennedy shows you how to catapult your company to the cutting edge.

No B.S. Guide to Direct Response Social Media Marketing: The Ultimate No Holds Barred Guide to Producing Measurable, Monetizable Results with Social Media Marketing

by Dan S. Kennedy Kim Walsh-Phillips

To avoid grabbing every business owner he meets by the shoulders and shaking them, millionaire maker Dan S. Kennedy has joined with marketing strategist Kim Walsh-Phillips to help business owners, private practice professionals, and professional marketers start making dollars and cents of their social media marketing. Daring readers to stop accepting non-monetizable "likes” and "shares” for their investment of time, money, and energy, Kennedy and Walsh-Phillips urge readers to see their social platforms for what they are--another channel to reach customers and gain leads and sales for their efforts. Illustrated by case studies and examples, this No B. S. guide delivers practical strategies for applying the same direct- response marketing rules Kennedy has himself found effective in all other mediums. Covers: *How to stop being a wimp and make the switch from a passive content presence into an active conversion tool *How to become a lead magnet by setting up social media profiles that focus on the needs of ideal prospects (not the product or service) *Creating raving fans that create introductions to their networks *How to move cold social media traffic into customers *The role of paid media and how to leverage social media advertising to drive sales

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

by David Kennedy Patrick Engebretson

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.

Metasploit

by David Kennedy Devon Kearns Jim O'Gorman Mati Aharoni

<p>The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. <p>Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:–Find and exploit unmaintained, misconfigured, and unpatched systems–Perform reconnaissance and find valuable information about your target–Bypass anti-virus technologies and circumvent security controls–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery–Use the Meterpreter shell to launch further attacks from inside the network–Harness standalone Metasploit utilities, third-party tools, and plug-ins–Learn how to write your own Meterpreter post exploitation modules and scriptsYou'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Facebook in One Hour for Lawyers

by Dennis Kennedy Allison C. Shields

Many lawyers use Facebook(r), the world's most popular social networking platform, to communicate with friends and family across the globe. But lawyers are missing a major opportunity if they do not consider the business possibilities of their Facebook(r) accounts. With a few simple steps, lawyers can harness Facebook(r) to market their services, grow their practices, and expand their legal network--all by using the same methods they already use to communicate with friends and family. Facebook(r) in One Hour for Lawyers will show any attorney--from Facebook(r) novices to advanced users--how to use this powerful tool for both professional and personal purposes. In just one hour, you will learn to: Set up a Facebook(r) account Optimize privacy and other settings Create a profile and manage your timeline Find, organize, and manage friends Use Facebook(r) search and navigation Participate on Facebook(r) with updates, comments, likes, and timelines Send messages, join groups, and subscribe to feeds Establish a business page Monitor your Facebook(r) network Develop a Facebook(r) strategy to grow your legal network"

LinkedIn® In One Hour for Lawyers

by Dennis Kennedy Allison C. Shields

Lawyers work in a world of networks, connections, referrals, and recommendations. For many lawyers, the success of these networks determines the success of their practice. LinkedIn®, the premier social networking tool for business, can help you create, nurture, and expand your professional network and gain clients in the process. LinkedIn® in One Hour for Lawyers provides an introduction to this powerful tool in terms that any attorney can understand

Net Work

by Helen Kennedy

A detailed study of the work of web designers, drawing on empirical research carried out from the birth of web design as an area of work in the 1990s to its professionalisation in the twenty-first century.

Post, Mine, Repeat

by Helen Kennedy

In this book, Helen Kennedy argues that as social media data mining becomes more and more ordinary, as we post, mine and repeat, new data relations emerge. These new data relations are characterised by a widespread desire for numbers and the troubling consequences of this desire, and also by the possibility of doing good with data and resisting data power, by new and old concerns, and by instability and contradiction. Drawing on action research with public sector organisations, interviews with commercial social insights companies and their clients, focus groups with social media users and other research, Kennedy provides a fascinating and detailed account of living with social media data mining inside the organisations that make up the fabric of everyday life.

Refine Search

Showing 24,276 through 24,300 of 54,499 results