Browse Results

Showing 41,351 through 41,375 of 54,430 results

Building Digital Culture: A Practical Guide to Successful Digital Transformation

by Daniel Rowles Thomas Brown

Building Digital Culture aims to answer a simple question: How can organisations succeed when the environment they operate in is changing so quickly? The last thing businesses need today is a digital strategy. Instead, their strategy needs to be fit for our fast-changing digital world, where businesses have more data than they know what to do with, a media landscape that's exploded in size and complexity, the risk of a new disruption around every corner, and only one certainty: that this change won't let up.Building Digital Culture doesn't address whether or not you should advertise on Facebook or invest in virtual reality. It doesn't seek to unearth a silver bullet to make digital investments a sure-thing. It steps back from the hype, and argues that whatever digital might mean for your business, if you don't create a digital culture you'll most likely fail, or at least fall short of what you want to achieve.Daniel Rowles and Thomas Brown combine more than 30 years of experience at the forefront of marketing and digital developments to help you to navigate from being a business that tolerates or acts digital, to one that truly is digital.Building Digital Culture is based on more than 200 hours of research, candid interviews and contributions from senior leaders at a diverse range of brands including Twitter, Made.com, Tech London Advocates, Deloitte, HSBC, Reckitt Benckiser, Ladbrokes, Direct Line Group, The Metropolitan Police, Zurich Insurance and many more.

Podcasting Marketing Strategy: A Complete Guide to Creating, Publishing and Monetizing a Successful Podcast

by Daniel Rowles Ciaran Rogers

Podcasting is a hugely persuasive yet under-utilized channel accessed by an affluent and influential demographic. In a crowded and noisy digital environment, it gives organizations, brand builders and marketers the unique opportunity to stand out and drive engagement with target audiences. It offers accurate and measurable levels of allegiance that can only be dreamed of on other digital channels. Podcasting Marketing Strategy is a complete guide to the podcast environment. It describes the importance of podcasting for businesses and explains why, uniquely, it has the highest level of consumer commitment than any other social media. Written by an award-winning author and his co-host of the global top ten iTunes podcast, The Digital Marketing Podcast, this book explains how podcasting can drive business results, advises on how to record, edit and advertise your content and provides a unique digital marketing toolkit. Supported by case studies from influential organizations around the globe, Podcasting Marketing Strategy is the definitive authority to making and publishing podcasts that deliver quantifiable results.

You Can Trust Me: The gripping, glamorous psychological thriller you won't want to miss

by Emma Rowley

The gripping psychological thriller full of twists and turns, from the bestselling author of WHERE THE MISSING GO - for fans of FOUND by Erin Kinsley, ALL THE RAGE by Cara Hunter and THE FAMILY UPSTAIRS by Lisa Jewell.'A gripping mystery in two compelling voices, exposing the dark side of influencer culture' Claire McGowan, author of THE PUSH*****************You can trust me.But can I trust you?Olivia is the domestic goddess who has won millions of followers by sharing her picture-perfect life online. And now she's releasing her tell-all autobiography.For professional ghostwriter Nicky it's the biggest job of her career. But as she delves deeper into Olivia's life, cracks begin to appear in the glamorous façade. From the strained relationship with her handsome husband, to murky details of a tragic family death in her childhood, the truth belies Olivia's perfect public image.But why is Olivia so desperate to leave an old tragedy well alone? And how far will she go to keep Nicky from the truth?*****************If you like Clare Mackintosh, Fiona Barton, Teresa Driscoll, Jenny Blackhurst, Rachel Abbott, Laura Marshall, Joy Ellis, Cara Hunter, Mel Sherratt or Lisa Jewell then you will be utterly gripped by this psychological thriller with a massive twist you won't see coming.Praise for You Can Trust Me:'Brilliant characters and unexpected turns! Grows and changes with every reveal...' Louisa de Lange, author of THE DREAM WIFE'So clever, so unpredictable, dark, haunting. I don't have enough words to do it justice' L V Matthews, author of THE PRANK (coming 2021)'An outstanding story. Cleverly plotted, fantastically written and a fast-paced, intriguing read' Lauren North, author of THE PERFECT BETRAYAL'Emotional, gripping and fast-paced. A taut, extremely satisfying thriller' Carys Jones, author of THE LIST'A completely gripping thriller, and a breath of fresh air. You need to read this book' Rebecca Reid, author of TRUTH HURTS'An utterly absorbing novel to escape into' Vikki Patis, author of THE GIRL ACROSS THE STREET'Twists and more twists! Original and gripping...' Jackie Kabler, author of THE PERFECT COUPLE'Atmospheric and claustrophobic. Very cleverly plotted; you won't know who to trust' Catherine Cooper, author of THE CHALET'Loved how it grasped my attention right from the off and then didn't let go!' Sam Carrington, author of SAVING SOPHIE'Curl up on the sofa with You Can Trust Me, Emma Rowley's tense thriller' Grazia'Rowley has a firm grip on language and plot, and her easy, chatty style disguises a genuine emotional intelligence' Daily Mail'An involving and atmospheric psychological thriller' Crime Monthly

You Can Trust Me: The gripping, glamorous psychological thriller you won't want to miss

by Emma Rowley

The gripping psychological thriller full of twists and turns, from the bestselling author of WHERE THE MISSING GO - for fans of FOUND by Erin Kinsley, ALL THE RAGE by Cara Hunter and THE FAMILY UPSTAIRS by Lisa Jewell.'A gripping mystery in two compelling voices, exposing the dark side of influencer culture' Claire McGowan, author of THE PUSH*****************You can trust me.But can I trust you?Olivia is the domestic goddess who has won millions of followers by sharing her picture-perfect life online. And now she's releasing her tell-all autobiography.For professional ghostwriter Nicky it's the biggest job of her career. But as she delves deeper into Olivia's life, cracks begin to appear in the glamorous façade. From the strained relationship with her handsome husband, to murky details of a tragic family death in her childhood, the truth belies Olivia's perfect public image.But why is Olivia so desperate to leave an old tragedy well alone? And how far will she go to keep Nicky from the truth?*****************If you like Clare Mackintosh, Fiona Barton, Teresa Driscoll, Jenny Blackhurst, Rachel Abbott, Laura Marshall, Joy Ellis, Cara Hunter, Mel Sherratt or Lisa Jewell then you will be utterly gripped by this psychological thriller with a massive twist you won't see coming.Praise for You Can Trust Me:'Brilliant characters and unexpected turns! Grows and changes with every reveal...' Louisa de Lange, author of THE DREAM WIFE'So clever, so unpredictable, dark, haunting. I don't have enough words to do it justice' L V Matthews, author of THE PRANK (coming 2021)'An outstanding story. Cleverly plotted, fantastically written and a fast-paced, intriguing read' Lauren North, author of THE PERFECT BETRAYAL'Emotional, gripping and fast-paced. A taut, extremely satisfying thriller' Carys Jones, author of THE LIST'A completely gripping thriller, and a breath of fresh air. You need to read this book' Rebecca Reid, author of TRUTH HURTS'An utterly absorbing novel to escape into' Vikki Patis, author of THE GIRL ACROSS THE STREET'Twists and more twists! Original and gripping...' Jackie Kabler, author of THE PERFECT COUPLE'Atmospheric and claustrophobic. Very cleverly plotted; you won't know who to trust' Catherine Cooper, author of THE CHALET'Loved how it grasped my attention right from the off and then didn't let go!' Sam Carrington, author of SAVING SOPHIE'Curl up on the sofa with You Can Trust Me, Emma Rowley's tense thriller' Grazia'Rowley has a firm grip on language and plot, and her easy, chatty style disguises a genuine emotional intelligence' Daily Mail'An involving and atmospheric psychological thriller' Crime Monthly

Drive-By Journalism: The Assault on Your Need to Know

by Arthur Rowse

A sobering look at the effect of mega-corporate media dominance; puts the lie to the myth of liberal bias in the mass media.

ProBlogger

by Darren Rowse Chris Garrett

An update of one of the bestselling blogging books, written by two of the world's most successful bloggersThere's a reason why the first two editions of this book have sold thousands of copies worldwide. Written by two of the world's most successful bloggers, it's one of the clearest books out there on how to earn an income from your blog. This new edition gets you up to date on the very latest changes that affect the blogging-for-business landscape. Featuring new material on Twitter, Facebook, and LinkedIn; plus new ways and tools to grow your audience and expand your business beyond your blog, this professional blogger's bible is better than ever. Helps novices choose a blog topic, analyze the market, set up a blog, promote it, and earn revenueGives aspiring bloggers proven techniques and the tools they need to succeed in building a business from their blogsReveals 20 key ingredients for a successful blog postOffers solid, step-by-step instruction on how bloggers actually make money, why niches matter, how to use essential blogging tools and take advantage of social media and content aggregators, how to optimize your advertising, and much moreIncludes techniques for attracting and growing an audience and how to mine new business opportunities beyond your blogWritten by two fulltime professional bloggers, this exciting, updated edition of ProBlogger tells you exactly how to launch and maintain a blog that makes money.

Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners

by Alexander J. Roxon

Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now. What You’ll LearnUnderstand some of the basic concepts of incident response.Experience how a real-life incident can go from zero to chaos very rapidly.Find out how being proactive can significantly improve how information security breaches play out.Discover how to dampen the effects of a breach. Who This Book Is For This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.

Digital Image Forensics: Theory and Implementation (Studies in Computational Intelligence #755)

by Aniket Roy Rahul Dixit Ruchira Naskar Rajat Subhra Chakraborty

This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.

Wind Power Based Isolated Energy Systems

by Anindita Roy Santanu Bandyopadhyay

This book offers methods to improve energy access and support social and economic development through the appropriate and reliable design of isolated wind energy systems. The findings reported on wind based isolated power generation show that the proper match of turbine diameter and generator rating is vital, and is governed by the site wind resource and the load profile to be served. The methodology for sizing and selecting appropriate system parameters, taking into account the resource uncertainty, is demonstrated throughout the chapters of this monograph. Readers will discover information on the methodologies for modelling, design and optimization of the systems in terms of safety, functionality, longevity, and practicality. Details are provided on the design space of wind-battery systems, multiple wind generator systems, and wind-PV-battery hybrids to cover all the bases of isolated wind energy systems. This monograph aims to serve as a guide to system developers, manufacturers, and financing institutions on the design aspects of isolated wind energy systems.

The Android Game Developer's Handbook

by Avisekhar Roy

Discover an all in one handbook to developing immersive and cross-platform Android games About This Book * Practical tips and tricks to develop powerful Android games * Learn to successfully implement microtransactions and monitor the performance of your game once it's out live. * Integrate Google's DIY VR tool and Google Cardboard into your games to join in on the VR revolution Who This Book Is For This book is ideal for any game developer, with prior knowledge of developing games in Android. A good understanding of game development and a basic knowledge on Android platform application development and JAVA/C++ will be appreciated. What You Will Learn * Learn the prospects of Android in Game Development * Understand the Android architecture and explore platform limitation and variations * Explore the various approaches for Game Development using Android * Learn about the common mistakes and possible solutions on Android Game Development * Discover the top Cross Platform Game Engines and port games on different android platform * Optimize memory and performance of your game. * Familiarize yourself with different ways to earn money from Android Games In Detail Gaming in android is an already established market and growing each day. Previously games were made for specific platforms, but this is the time of cross platform gaming with social connectivity. It requires vision of polishing, design and must follow user behavior. This book would help developers to predict and create scopes of improvement according to user behavior. You will begin with the guidelines and rules of game development on the Android platform followed by a brief description about the current variants of Android devices available. Next you will walk through the various tools available to develop any Android games and learn how to choose the most appropriate tools for a specific purpose. You will then learn JAVA game coding standard and style upon the Android SDK. Later, you would focus on creation, maintenance of Game Loop using Android SDK, common mistakes in game development and the solutions to avoid them to improve performance. We will deep dive into Shaders and learn how to optimize memory and performance for an Android Game before moving on to another important topic, testing and debugging Android Games followed by an overview about Virtual Reality and how to integrate them into Android games. Want to program a different way? Inside you'll also learn Android game Development using C++ and OpenGL. Finally you would walk through the required tools to polish and finalize the game and possible integration of any third party tools or SDKs in order to monetize your game when it's one the market! Style and approach The book follows a handbook approach, focused on current and future game development trend from every possible aspect including monetization and sustainability in the market.

Mastering CentOS 7 Linux Server

by Bhaskarjyoti Roy Mohamed Alibi

Configure, manage, and secure a CentOS 7 Linux server to serve a variety of services provided in a sustainable computer's infrastructure. About This Book * Learn how to efficiently set up and manage a Linux server using one of the best suited technologies for this purpose, CentOS 7 * Personalize your Linux server and familiarize yourself with the latest tools and utilities setup provided by the new CentOS distribution * Follow a step-by-step tutorial through the configuration of the requested services with the capacity to personalize them as per your needs Who This Book Is For If you are a Linux system administrator with an intermediate administration level, this is your opportunity to master the brand new distribution of CentOS. If you wish to possess a fully sustainable Linux server, with all its new tools and tweaks, that serves a variety of services to your users and customers, this book is ideal for you. It is your ticket to easily adapt to all the changes made in the latest shift. What You Will Learn * Manage CentOS 7 users, groups, and root access privileges * Enhance the server's security through its firewall and prevent the most common attacks from penetrating or disabling the server * Explore and implement the common, useful services that a CentOS 7 server can provide * Monitor your server infrastructure for system or hardware issues * Create and configure a virtual machine using virtualization technologies * Implement a cloud computing solution on a single node system * Get an introduction to the configuration management tools and their usage * Discover the importance of the tools that provide remote connection, server service security, and system and process monitoring tools In Detail Most server infrastructures are equipped with at least one Linux server that provides many essential services, both for a user's demands and for the infrastructure itself. Setting up a sustainable Linux server is one of the most demanding tasks for a system administrator to perform. However, learning multiple, new technologies to meet all of their needs is time-consuming. CentOS 7 is the brand new version of the CentOS Linux system under the RPM (Red Hat) family. It is one of the most widely-used operating systems, being the choice of many organizations across the world. With the help of this book, you will explore the best practices and administration tools of CentOS 7 Linux server along with implementing some of the most common Linux services. We start by explaining the initial steps you need to carry out after installing CentOS 7 by briefly explaining the concepts related to users, groups, and right management, along with some basic system security measures. Next, you will be introduced to the most commonly used services and shown in detail how to implement and deploy them so they can be used by internal or external users. Soon enough, you will be shown how to monitor the server. We will then move on to master the virtualization and cloud computing techniques. Finally, the book wraps up by explaining configuration management and some security tweaks. All these topics and more are covered in this comprehensive guide, which briefly demonstrates the latest changes to all of the services and tools with the recent shift from CentOS 6 to CentOS 7. Style and approach This is a detailed and in-depth guide to help you administrate CentOS 7 for the usage of your server's infrastructure and also for personal network security. Each section shows a list of tools and utilities that are useful to perform the required task, in an easy to understand manner.

Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems)

by Bimal Kumar Roy Atul Chaturvedi Boaz Tsaban Sartaj Ul Hasan

The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.

Patient-Specific Modeling of the Cardiovascular System

by Roy C.P. Kerckhoffs

The main purpose of the book is to demonstrate the design of a variety of patient-specific models within the cardiovascular system in computational biology. The maturation of computational biology could lead to a new approach to medicine. During the last five to ten years, there have been many improvements in diagnostic medical technologies such as multi-slice cardiac CT imaging, 3-D electroanatomic mapping, and many types of applications of Magnetic Resonance Imaging (i.e. magnetic resonance tagging and diffusion tensor imaging). Combined with more powerful computing resources and more accurate predictive computational models it is feasible to begin developing mechanistic patient-specific models that may help diagnosis, guide therapy or surgery, and predict outcomes of the latter. Many questions need to be answered before computational modeling can be fully integrated with standard care, such as what is the minimal data set needed from the patient in order to build a reliable predictive model? What accuracy is needed? How will the initial baseline model be validated? What are reasonable computation times? Is some type of perturbation of the patient's physiology necessary? How could they be integrated with current practices? Are physicians willing to accept these models? These questions will also serve as guidelines throughout the chapters. The book will try to cover, such as cardiac electrophysiology, cardiac (muscle) mechanics, circulation dynamics, arterial and venous flow, angiogenesis, remodeling, metabolism, or combinations between these such as cardiac electromechanics or fluid-solid interactions.

Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX

by David Roy Harry Reynolds Douglas Richard Hanks Jr.

Discover why routers in the Juniper MX Series--with their advanced feature sets and record-breaking scale--are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis LAG, Inline NAT, IPFLOW, and many other Juniper MX features.This second edition was written by a Senior NOC engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX--Juniper MX's virtual instance.Work with Juniper MX's bridging, VLAN mapping, and support for thousands of virtual switchesExamine Juniper MX high-availability features and protocolsUse Trio Chipset's load balancing features for different types of trafficExplore the benefits and typical use cases of vMXAdd an extra layer of security with Junos DDoS protectionCreate a firewall filter framework that applies filters specific to your networkDiscover the advantages of hierarchical schedulingCombine Juniper MX routers, using a virtual chassis or Multi-chassis LAGInstall network services such as Network Address Translation (NAT)

RabbitMQ in Depth

by Gavin M. Roy

SummaryRabbitMQ in Depth is a practical guide to building and maintaining message-based applications. This book provides detailed coverage of RabbitMQ with an emphasis on why it works the way it does.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyAt the heart of most modern distributed applications is a queue that buffers, prioritizes, and routes message traffic. RabbitMQ is a high-performance message broker based on the Advanced Message Queueing Protocol. It?s battle tested, ultrafast, and powerful enough to handle anything you can throw at it. It requires a few simple setup steps, and you can instantly start using it to manage low-level service communication, application integration, and distributed system message routing.About the BookRabbitMQ in Depth is a practical guide to building and maintaining message-based applications. This book provides detailed coverage of RabbitMQ with an emphasis on why it works the way it does. You'll find examples and detailed explanations based in real-world systems ranging from simple networked services to complex distributed designs. You'll also find the insights you need to make core architectural choices and develop procedures for effective operational management. What's InsideAMQP, the Advanced Message Queueing ProtocolCommunicating via MQTT, Stomp, and HTTPValuable troubleshooting techniquesDatabase integrationAbout the ReaderWritten for programmers with a basic understanding of messaging-oriented systems.About the AuthorGavin M. Roy is an active, open source evangelist and advocate who has been working with internet and enterprise technologies since the mid-90s. Technical editor James Titcumb is a freelance developer, trainer, speaker, and active contributor to open source projects.Table of ContentsPART 1 - RABBITMQ AND APPLICATION ARCHITECTUREFoundational RabbitMQ How to speak Rabbit: the AMQ Protocol An in-depth tour of message properties Performance trade-offs in publishing Don't get messages; consume them Message patterns via exchange routing PART 2 - MANAGING RABBITMQ IN THE DATA CENTER OR THE CLOUDScaling RabbitMQ with clusters Cross-cluster message distribution PART 3 - INTEGRATIONS AND CUSTOMIZATIONUsing alternative protocols Database integrations

Blockchain Development for Finance Projects: Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar

by Ishan Roy

A practical blockchain handbook designed to take you through implementing and re-engineering banking and financial solutions and workflows using eight step-by-step projects Key Features Implement various end-to-end blockchain projects and learn to enhance present-day financial solutions Use Ethereum, Hyperledger, and Stellar to build public and private decentralized applications Address complex challenges faced in the BFSI domain using different blockchain platform services Book Description Blockchain technology will continue to play an integral role in the banking and finance sector in the coming years. It will enable enterprises to build transparent and secure business processes. Experts estimate annual savings of up to 20 billion dollars from this technology. This book will help you build financial apps using blockchain, guiding you through enhancing popular products and services in the banking and finance sector. The book starts by explaining the essential concepts of blockchain, and the impact of blockchain technology on the BFSI sector. Next, you'll delve into re-designing existing banking processes and building new financial apps using blockchain. To accomplish this, you'll work through eight blockchain projects. By demonstrating the entire process, the book helps you understand everything from setting up the environment and building frontend portals to system integration and testing apps. You will gain hands-on experience with the Ethereum, Hyperledger Fabric, and Stellar to develop private and public decentralized apps. Finally, you'll learn how to use ancillary platforms and frameworks such as IPFS, Truffle OpenZeppelin, and MetaMask. By the end of this blockchain book, you'll have an in-depth understanding of how to leverage distributed ledgers and smart contracts for financial use cases. What you will learn Design and implement blockchain solutions in a BFSI organization Explore common architectures and implementation models for enterprise blockchain Design blockchain wallets for multi-purpose applications using Ethereum Build secure and fast decentralized trading ecosystems with Blockchain Implement smart contracts to build secure process workflows in Ethereum and Hyperledger Fabric Use the Stellar platform to build KYC and AML-compliant remittance workflows Map complex business workflows and automate backend processes in a blockchain architecture Who this book is for This book is for blockchain and Dapps developers, or anyone looking for a guide to building innovative and highly secure solutions in the fintech domain using real-world use cases. Developers working in financial enterprises and banks, and solution architects looking to build brand new process flows using blockchain technology will also find the book useful. Experience with Solidity programming and prior knowledge of finance and trade are required to get the most out of this book.

Artificial Intelligence, Ethics and the Future of Warfare: Global Perspectives

by Kaushik Roy

This volume examines how the adoption of AI technologies is likely to impact strategic and operational planning, and the possible future tactical scenarios for conventional, unconventional, cyber, space and nuclear force structures. In addition to developments in the USA, Britain, Russia and China, the volume also explores how different Asian and European countries are actively integrating AI into their military readiness. It studies the effect of AI and related technologies in training regimens and command structures. The book also covers the ethical and legal aspects of AI augmented warfare.The volume will be of great interest to scholars, students and researchers of military and strategic studies, defence studies, artificial intelligence and ethics.

Finish Your Film! Tips and Tricks for Making an Animated Short in Maya: Tips And Tricks For Making An Animated Short In Maya

by Kenny Roy

Finish Your Film! Tips and Tricks for Making an Animated Short in Maya is a first-of-its-kind book that walks the reader step-by-step through the actual production processes of creating a 3D Short film with Maya. Other books focus solely on the creative decisions of 3D Animation and broadly cover the multiple phases of animation production with no real applicable methods for readers to employ. This book shows you how to successfully manage the entire Maya animation pipeline. This book blends together valuable technical tips on film production and real-world shortcuts in a step-by-step approach to make sure you do not get lost. Follow along with author and director Kenny Roy as he creates a short film in front of your eyes using the exact same methods he shows you in the book. Armed with this book, you'll be able to charge forth into the challenge of creating a short film, confident that creativity will show up on screen instead of being stifled by the labyrinth that is a 3D animation pipeline.

How to Cheat in Maya 2014: Tools and Techniques for Character Animation

by Kenny Roy

All professional animators know a handful of secrets that give them an edge in a production environment. "How to Cheat in Maya" puts these secrets in your hands! Learn time and energy-saving techniques tested in real Hollywood productions in this book, jam-packed with screenshots and scene files designed to get you up to speed quickly. <P><P>From menus to modeling, lipsync to lighting, How to Cheat in Maya 2014 covers all of the methods available in the latest version of Maya. Get up to speed quickly and produce stellar results with these insider workflows. With new, updated cheats for the latest version of Maya, How to Cheat in Maya 2014 is an essential guide for amateur and professional 3D animators alike. Fully updated with gold-mine coverage including: expanded sections on production workflow, all new chapters covering rigging cheats and Maya's referencing tools, and brand new project files demonstrating production-proven techniques. <P><P>The companion website includes complete scene files for exercises and techniques, extra rigs, Quicktime movies of full projects, and video tutorials.

How to Cheat in Maya 2013: Tools and Techniques for Character Animation

by Kenny Roy Eric Luhta

All professional animators know a handful of secrets that give them an edge in a production environment. "How to Cheat in Maya" puts these secrets in your hands! Learn time and energy saving techniques tested in real Hollywood productions in this book, jam-packed with screenshots and scene files designed to get you up to speed quickly. From menus to modeling, lipsync to lighting, How to Cheat in Maya 2013 covers all of the methods available in the latest version of Maya. Get up to speed quickly and produce stellar results with these insider workflows. With new, updated cheats for the latest version of Maya, "How to Cheat in Maya" is an essential guide for amateur and professional 3D animators alike. Fulyl updated with gold-mine coverage including: expanded sections on production workflow, all new chapters covering rigging cheats and Maya's referencing tools, and brand new project files demonstrating production-proven techniques. The companion website includes complete scene files for exercises and techniques, extra rigs, Quicktime movies of full projects, and video tutorials.

In Silico Modeling of Drugs Against Coronaviruses: Computational Tools and Protocols (Methods in Pharmacology and Toxicology)

by Kunal Roy

This essential volume explores a variety of tools and protocols of structure-based (homology modeling, molecular docking, molecular dynamics, protein-protein interaction network) and ligand-based (pharmacophore mapping, quantitative structure-activity relationships or QSARs) drug design for ranking and prioritization of candidate molecules in search of effective treatment strategy against coronaviruses. Beginning with an introductory section that discusses coronavirus interactions with humanity and COVID-19 in particular, the book then continues with sections on tools and methodologies, literature reports and case studies, as well as online tools and databases that can be used for computational anti-coronavirus drug research. Written for the Methods in Pharmacology and Toxicology series, chapters include the kind of practical detail and implementation advice that ensures high quality results in the lab. Comprehensive and timely, In Silico Modeling of Drugs Against Coronaviruses: Computational Tools and Protocols is an ideal reference for researchers working on the development of novel anti-coronavirus drugs for SARS-CoV-2 and for coronaviruses that will likely appear in the future.

Instant Getting Started with VMware Fusion

by Michael Roy

This book is a hands-on, practical guide that will help readers to understand the various capabilities of VMware Fusion with the help of real-world examples. This book is a must for every Mac user out there who is in the process of transitioning from Windows to OS X. Whether you're new to Fusion or you've been using it for years, there's something new for everyone to learn.

Interoperability in IoT for Smart Systems (Intelligent Systems)

by Monideepa Roy Pushpendu Kar Sujoy Datta

Interoperability in IoT for Smart Systems discusses the different facets of interoperability issues among the IoT devices and their solutions, the scalability issues in an IoT network, and provides solutions for plug-n-play of new devices with the existing IoT system. It also addresses the possible usage of interoperable and plug-n-play IoT networks in different systems to make them smarter. Aimed at researchers and graduate students in computer science, computer engineering, computer networks, electronics engineering, this book Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT systems

Recommender Systems: A Multi-Disciplinary Approach (Intelligent Systems)

by Monideepa Roy Pushpendu Kar Sujoy Datta

Recommender Systems: A Multi-Disciplinary Approach presents a multi-disciplinary approach for the development of recommender systems. It explains different types of pertinent algorithms with their comparative analysis and their role for different applications. This book explains the big data behind recommender systems, the marketing benefits, how to make good decision support systems, the role of machine learning and artificial networks, and the statistical models with two case studies. It shows how to design attack resistant and trust-centric recommender systems for applications dealing with sensitive data. Features of this book: Identifies and describes recommender systems for practical uses Describes how to design, train, and evaluate a recommendation algorithm Explains migration from a recommendation model to a live system with users Describes utilization of the data collected from a recommender system to understand the user preferences Addresses the security aspects and ways to deal with possible attacks to build a robust system This book is aimed at researchers and graduate students in computer science, electronics and communication engineering, mathematical science, and data science.

Cyber Security and Digital Forensics: Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems #896)

by Nihar Ranjan Roy Sudeep Tanwar Usha Batra

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

Refine Search

Showing 41,351 through 41,375 of 54,430 results