Browse Results

Showing 54,201 through 54,225 of 54,311 results

Content - The Atomic Particle of Marketing: The Definitive Guide to Content Marketing Strategy

by Rebecca Lieb

DISTINGUISHED FAVOURITE: NYC Big Book Awards 2017Content, in all its forms, is the single most critical element of any marketing campaign. Finding a successful equilibrium between content marketing and content strategy is difficult, but essential. Content - The Atomic Particle of Marketing goes beyond superficial descriptions of how to produce engaging social media content to offer the results of many years of deep quantitative research, and hours of interviews with senior marketers at some of the world's leading brands. Written by a recognized industry thought leader, Content - The Atomic Particle of Marketing explores how content functions in the broader framework of all marketing, as well as organizational concerns and IT decision making. It demonstrates the value content brings not only to "owned" media initiatives, such as a company website or blog, but also the essential role content plays in all other marketing initiatives, from social media to advertising to offline channels. It will enable readers to make the organizational, staffing, tools and process decisions necessary to get content up and running across divisions and organizational silos. Deeply researched and insightful, Content - The Atomic Particle of Marketing is, quite simply, the definitive research-based guide to content marketing.

IoT/AI Control of VRF Distributed Building Air-Conditioners

by Chuzo Ninagawa

This book describes new energy service controls of VRF (Variable Refrigerant Flow) air-conditioners, i.e., distributed-type air-conditioners for commercial buildings in the near future, in the context of the energy savings for CO2 reduction and the reform of the electric power system. In other words, this book introduces the state-of-the-art technology of the next-generation distributed building air-conditioning energy service system, from IoT cloud control to AI optimal control, as well as standards for the smart grid supply and demand adjustment market. Rather than simple saving energy by On Off operations or shifting set- temperatures, the author proposes technology that sends numerical commands for the air-conditioner inverters directly from the cloud. By using this innovative IoT method, this book describes how to realizes the AI optimal cloud control as a cluster of air-conditioners while machine-learning of each air conditioner's situation.

Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Third EAI International Conference, BigIoT-EDU 2023, August 29-31, 2023, Liuzhou, China, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #581)

by Yinjun Zhang Nazir Shah

The five-volume set LNICST 580-584 constitutes the proceedings of the Third EAI International Conference on Application of Big Data, Blockchain, and Internet of Things for Education Informatization, BigIoT-EDU 2023, held in Liuzhou, China, during August 29–31, 2023. The 272 full papers presented in these proceedings were carefully reviewed and selected from 718 submissions. With a primary focus on research fields such as Digitization of education, Smart classrooms and Massive Online Open Courses (MOOCs), these papers are organized in the following topical sections across the five volumes: Part I: Application of data mining in smart education; Application of intelligent algorithms in English teaching. Part II: Application of decision tree algorithm in intelligent management system of universities; Research on the application of Big data in smart teaching. Part III: Exploration of the application of computer-aided technology in intelligent translation; Application of neural network algorithms in intelligent teaching; Application of artificial intelligence algorithms in the field of smart education. Part IV: Research on smart teaching in deep learning; Research and application of recommendation algorithms in personalized intelligent education; Application of cloud computing in intelligent teaching resource library; Application research of computer-aided online intelligent teaching. Part V: Application and practice of new media in smart teaching; Application of clustering algorithm in intelligent education resource library; Application of association rule algorithm in intelligent education system.

Data-Centric Business and Applications: Advancements in Information and Knowledge Management, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #208)

by Solomiia Fedushko Peter Štarchoň Katarína Gubíniová

This book stands out by exploring the significance of data in various aspects of business, including operations, decision-making, and application development, in a comprehensive and accessible manner. It delves into advanced topics such as data management, analytics, knowledge discovery, artificial intelligence, data-centric business models, emerging technologies, and ethical implications, providing a unique perspective. The book is appropriate for academics, professionals, and researchers with intermediate to advanced data management skills. Data plays a crucial role in today's rapidly evolving digital environment, serving as the foundation for businesses and the key element in driving innovation across diverse industries. This book delves into the latest advancements in data management, their impact on modern corporate settings, and advanced information and knowledge management concepts. The chapters in this book discuss various topics, including incorporating data-driven methods into business models, the difficulties and advantages of emerging technology, and the ethical aspects of making decisions based on data.

Stochastic Programming in Supply Chain Risk Management: Resilience, Viability, and Cybersecurity (International Series in Operations Research & Management Science #359)

by Tadeusz Sawik

This book offers a novel multi-portfolio approach and stochastic programming formulations for modeling and solving contemporary supply chain risk management problems. The focus of the book is on supply chain resilience under propagated disruptions, supply chain viability under severe crises, and supply chain cybersecurity under direct and indirect cyber risks. The content is illustrated with numerous computational examples, some of which are modeled on real-world supply chains subject to severe multi-regional or global crises, such as pandemics. In the computational examples, the proposed stochastic programming models are solved using an advanced algebraic modeling language AMPL and GUROBI solver. The book seamlessly continues the journey begun in the author’s previously published book “Supply Chain Disruption Management: Using Stochastic Mixed Integer Programming.” It equips readers with the knowledge, tools, and managerial insights needed to effectively model and address modern supply chain risk management challenges. As such, the book is designed for practitioners and researchers who are interested in supply chain risk management. Master’s and Ph.D. students in disciplines like supply chain management, operations research, industrial engineering, applied mathematics, and computer science will also find the book a valuable resource.

Tourism and ICTs: Proceedings of the TURITEC 2023 Conference, October 19–20, 2023, Málaga, Spain (Springer Proceedings in Business and Economics)

by Antonio J. Guevara Plaza Alfonso Cerezo Medina Enrique Navarro Jurado

This open-access book presents the best research papers from the XIV International Congress on Tourism and Information and Communications Technologies (TURITEC2023), held in Málaga, Spain from 19 to 20 October 2023. The book explores the profound impact of COVID-19 on the tourism industry and the increasing importance of digitalization and Information and Communication Technologies (ICTs) as key drivers for the industry's recovery, alongside sustainability. This curated collection of research papers offers conceptualizations, methodologies, analyses, and empirical case studies that illuminate the path to a resilient and sustainable future for tourism.

Digitale Bekleidung in virtuellen Welten: Digitalisierung für Zukunftsfähigkeit und Nachhaltigkeit in der Bekleidungswirtschaft (SDG - Forschung, Konzepte, Lösungsansätze zur Nachhaltigkeit)

by Regine Grafe Julia Zöbisch

Die Nutzung von digitaler Bekleidung als Verkaufsgut bietet eine Chance für effizienzbasierte Veränderungen in der Bekleidungstechnik, da insbesondere zeit- und materialintensive Prozesse entfallen bzw. deutlich reduziert werden können. Außerdem generiert die Transformation vom physischen zum digitalen Modedesign zusätzliche Marktsegmente und kann damit gleichzeitig das wirtschaftliche Innovationspotenzial der Branche erweitern. Der Bedarf an digitaler Bekleidung wird zu neuen Innovationen auf dem Gebiet der Software-Entwicklung führen, neue technische Schnittmengen, z. B. zur Gaming-Branche, generieren und damit gleichzeitig ein neues Feld auf dem Arbeitsmarkt für Einsteiger aus der Gaming-Branche schaffen.Dieses Buch präsentiert die Trends, die es derzeit in Sachen virtueller Bekleidung und den dafür sich entwickelnden Markt gibt. Ausgehend von der konventionellen Produktentwicklung in der Bekleidungstechnik und der digitalen Unterstützung durch 2D- sowie 3D-Design-Entwicklung soll aufgezeigt werden, welche produktionstechnischen Transfermöglichkeiten sich aktuell auf dem Markt für Bekleidung abzeichnen.

Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition

by Brian W. Kernighan

A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks workComputers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?In this updated edition of Understanding the Digital World, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included.Understanding the Digital World is a must-read for readers of all backgrounds who want to know more about computers and communications.

Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

by Andrew Miller Edward Felten Arvind Narayanan Joseph Bonneau Steven Goldfeder

An authoritative introduction to the exciting new technologies of digital moneyBitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more.An essential introduction to the new technologies of digital currencyCovers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much moreFeatures an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slidesAlso suitable for use with the authors' Coursera online courseElectronic solutions manual (available only to professors)

Hypermodern Python Tooling: Building Reliable Workflows For An Evolving Python Ecosystem

by Claudio Jolowicz

Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build reliable workflows beyond local development while staying in sync with the evolving ecosystem.With this hands-on guide, Python developers will learn how to forge the moving parts of a Python project into an easy-to-use toolchain, using state-of-the-art tools including Poetry, Nox, pytest, mypy, pre-commit, Black, Ruff, uv, Rye, Hatch, and more. Author Claudio Jolowicz shows you how to create robust Python project structures complete with unit tests, static analysis, code formatting, and type checking.You'll learn how to:Create open source projects with state-of-the-art infrastructureBuild a custom infrastructure for all Python projects in a company or teamImprove and modernize the infrastructure of an existing Python projectEvaluate modern Python tooling for adoption in existing projectsUse tools for packaging and dependency managementAutomate common development tasks such as testing, dependency updates, and publishing releases

Kahoot! Quiz Time Dinosaurs: Test Yourself Challenge Your Friends (Kahoot! Quiz Time)

by DK

More than 250 trivia questions for curious minds!When did dinosaurs roam the Earth? Which dinosaur was the biggest? Find out in this quiz book, packed with questions and facts about the age of the dinosaurs. Challenge yourself, your family, and friends with awesome questions based on the award-winning online Kahoot! games. Answer the questions, keep score, and declare the winner. Scan the QR codes throughout the book to find more cool quizzes on the same topics within Kahoot! and test your knowledge further. Go for gold and make learning awesome!Kahoot! and the K! logo are trademarks of Kahoot! AS.

Coding Games in Scratch

by Carol Vorderman

If you like playing computer games, why not make your own? This book has all you need to build amazing games, including thrilling racing challenges, zany platform games, and fiendish puzzles.Follow the simple steps to become an expert coder, using the popular programming language Scratch™ 3.0. This updated edition is the first to be tablet-computer friendly, making it even easier to get coding.Improve your coding skills and create your own games, before remixing and customizing them. Jumpy Monkey will show you how to simulate gravity in your games, or give Dog's Dinner a try to learn about collision detection.Pick up the fundamentals of computer programming in steps that make even the most difficult coding concepts fun and easy to understand. Don't just learn how computer code works—understand why it's done that way.Then share your games online and challenge friends and family to beat each other's scores. Once you've whizzed through the book, the possibilities are endless!

Syntactic Networks—Kernel Memory Approach (Studies in Computational Intelligence #1157)

by Tetsuya Hoya

This book proposes a novel connectionist approach to a challenging topic of language modeling within the context of kernel memory and artificial mind system, both proposed previously by the author in the very first volume of the series, Artificial Mind System—Kernel Memory Approach: Studies in Computational Intelligence, Vol. 1. The present volume focuses on how syntactic structures of language are modeled in terms of the respective composite connectionist architectures, each embracing both the nonsymbolic and symbolic parts. These two parts are developed via inter-module processes within the artificial mind system and eventually integrated under a unified framework of kernel memory. The data representation by the networks embodied within the kernel memory principle is essentially local, unlike conventional artificial neural network models such as the pervasive multilayer perceptron-based neural networks. With this locality principle, kernel memory inherently bears many attractive features, such as topologically unconstrained network formation, straightforward network growing, shrinking, and reconfiguration, no requirement of arduous iterative parameter tuning, construction of transparent and hierarchical data structures, and multimodal and temporal data processing via the network representation. Exploiting these multifacet properties of kernel memory with interweaving the notion of inter-module processing within the artificial mind system provides coherent accounts for concept formation and how various linguistic phenomena, viz. word compoundings, morphologies, and multiword constructions, are modeled. The description is then extended to more intricate network models of context-dependent lexical network and syntactic-oriented processing, the latter being the central theme of the present study, and further to those representing a hybrid of nonverbal and verbal thinking, and semantic and pragmatic aspects of sentential meaning. The book is intended for general readers engaging in various areas of study in cognitive science, computer science, engineering, linguistics, philosophy, psycholinguistics, and psychology.

Adaptive Instructional Systems: 6th International Conference, AIS 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings (Lecture Notes in Computer Science #14727)

by Jessica Schwarz Robert A. Sottilare

This book constitutes the refereed proceedings of 6th International Conference on Adaptive Instructional Systems, AIS 2024, held as part of the 26th International Conference, HCI International 2024, which took place in Washington, DC, USA, during June 29-July 4, 2024. The total of 1271 papers and 309 posters included in the HCII 2024 proceedings was carefully reviewed and selected from 5108 submissions. The HCII-AIS 2024 contributions have been organized in the following topical sections: Designing and developing adaptive instructional systems; adaptive learning experiences; AI in adaptive learning.

The IT Support Handbook: A How-To Guide to Providing Effective Help and Support to IT Users

by Mike Halsey

Become a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and effectively deal with any type of problem, including operating systems, software, and hardware. IT support is often complex, time-consuming, and expensive, but it doesn't have to be with the right processes in place. Whether you're an individual, part of an IT support team, or managing staff supporting PC users in their homes, this book will help you understand the right way to approach, troubleshoot, and isolate problems so they can be handled efficiently, with the least disruption and cost to your business. Expanded and revised for this second edition, you'll make yourself popular with your colleagues, and keep your clients and users happy and productive. New To This Edition The world of work has changed, with remote and hybrid working now the new normal and with IT Support departments worldwide having to adapt to this new paradigm. This expanded edition highlights the skills, tools, and structures needed to support businesses of any size in the new normal. What You'll Learn Manage reporting, and keep a record of issues that occur Provide effective remote support for users working from home or elsewhere in the world Use error and system reporting in Windows to obtain high-quality, relevant information Spot patterns in user behavior that may be causing difficult-to-diagnose problems Be familiar with best practices to make you a better support professional Who This Book Is For IT professionals, IT support (on-site and remote), and system administrators who manage support teams. No prior knowledge is required.

The Real Internet Architecture: Past, Present, and Future Evolution

by Pamela Zave Jennifer Rexford

A new way to understand the architecture of today&’s Internet, based on an innovative general model of network architecture that is rigorous, realistic, and modularThis book meets the long-standing need for an explanation of how the Internet's architecture has evolved since its creation to support an ever-broader range of the world's communication needs. The authors introduce a new model of network architecture that exploits a powerful form of modularity to provide lucid, insightful descriptions of complex structures, functions, and behaviors in today&’s Internet. Countering the idea that the Internet&’s architecture is &“ossified&” or rigid, this model—which is presented through hundreds of examples rather than mathematical notation—encompasses the Internet&’s original or &“classic&” architecture, its current architecture, and its possible future architectures.For practitioners, the book offers a precise and realistic approach to comparing design alternatives and guiding the ongoing evolution of their applications, technologies, and security practices. For educators and students, the book presents patterns that recur in many variations and in many places in the Internet ecosystem. Each pattern tells a compelling story, with a common problem to be solved and a range of solutions for solving it. For researchers, the book suggests many directions for future research that exploit modularity to simplify, optimize, and verify network implementations without loss of functionality or flexibility.

Global Perspectives on Teaching with Technology: Theories, Case Studies, and Integration Strategies

by Helen Crompton Agnes Chigona Nyarai Tunjera

Global Perspectives on Teaching with Technology presents a wealth of current research on how teacher education and training programs around the world are preparing teachers to integrate and apply learning technologies across subjects, grade levels, and regions. Digital tools are more integral than ever to an accessible and well-rounded education, although their rapid evolution and proliferation necessitate new guidance into their effective integration and intended outcomes. This book provides graduate students, faculty, and researchers of teacher education, as well as trainers of in-service teachers with field-tested frameworks, evidence-based theories and models, and real-world examples of the complexities and affordances of teaching with technology. Internationally sourced to reflect today's richly diverse and globalized learner populations, the case studies collected here offer fresh approaches for teacher educators and a springboard for education researchers studying how practitioners can thrive in their classrooms and foster equity among students.

Kahoot! Quiz Time Earth: Test Yourself Challenge Your Friends (Kahoot! Quiz Time)

by DK

More than 250 trivia questions for curious minds!What is the highest mountain in the world? What is the Earth’s core made of? Find out in this quiz book, packed with questions and facts about Planet Earth. Challenge yourself, your family, and friends with awesome questions based on the award-winning online Kahoot! games. Answer the questions, keep score, and declare the winner. Scan the QR codes throughout the book to find more cool quizzes on the same topics within Kahoot! and test your knowledge further. Go for gold and make learning awesome!Kahoot! and the K! logo are trademarks of Kahoot! AS.

The Book of Batch Scripting: From Fundamentals to Advanced Automation

by Jack McLarney

This fast-paced, hands-on, quirky introduction to Windows&’ Batch scripting language is ideal for coders of all skill levels.In this era of advanced programming languages, the simplicity, universality, and efficiency of Batch scripting holds undeniable value.Whether you&’re maintaining legacy systems or seeking to understand the foundations of command line automation, The Book of Batch Scripting shows you how to become proficient with this tool included in every version of Windows.As you work through the book, you will:Write a simple .bat file that performs a daily task with just a couple of mouse clicksDelve into variables and data types, and learn how a variable can possess two values at once—and why you should careLearn how to manage and collect data on files and directories either locally or on a networkHarness the power of the for command to build complex loops with just a few lines of codeExplore advanced topics like recursion, performing text searches, and even learn how to write a .bat file that writes a .bat fileExtend Batch to use features like booleans, floats, operators, arrays, hash tables, stacks, queues, and even object-oriented designWritten for beginners and experts alike, The Book of Batch Scripting will have you streamlining your workflow and writing effective code in no time. This simple but powerful tool is about to make your life a little bit easier and more fun.Requires: Microsoft Windows

The Singularity Is Nearer: When We Merge with AI

by Ray Kurzweil

The noted inventor and futurist&’s successor to his landmark book The Singularity Is Near explores how technology will transform the human race in the decades to comeSince it was first published in 2005, Ray Kurzweil&’s The Singularity Is Near and its vision of an exponential future have spawned a worldwide movement. Kurzweil's predictions about technological advancements have largely come true, with concepts like AI, intelligent machines, and biotechnology now widely familiar to the public.In this entirely new book Ray Kurzweil brings a fresh perspective to advances toward the Singularity—assessing his 1999 prediction that AI will reach human level intelligence by 2029 and examining the exponential growth of technology—that, in the near future, will expand human intelligence a millionfold and change human life forever. Among the topics he discusses are rebuilding the world, atom by atom with devices like nanobots; radical life extension beyond the current age limit of 120; reinventing intelligence by connecting our brains to the cloud; how exponential technologies are propelling innovation forward in all industries and improving all aspects of our well-being such as declining poverty and violence; and the growth of renewable energy and 3-D printing. He also considers the potential perils of biotechnology, nanotechnology, and artificial intelligence, including such topics of current controversy as how AI will impact employment and the safety of autonomous cars, and "After Life" technology, which aims to virtually revive deceased individuals through a combination of their data and DNA.The culmination of six decades of research on artificial intelligence, The Singularity Is Nearer is Ray Kurzweil&’s crowning contribution to the story of this science and the revolution that is to come.

Pandas Workout: 200 exercises to make you a stronger data analyst

by Reuven Lerner

Practice makes perfect pandas!Work out your pandas skills against dozens of real-world challenges, each carefully designed to build an intuitive knowledge of essential pandas tasks. In Pandas Workout you&’ll learn how to: Clean your data for accurate analysis Work with rows and columns for retrieving and assigning data Handle indexes, including hierarchical indexes Read and write data with a number of common formats, such as CSV and JSON Process and manipulate textual data from within pandas Work with dates and times in pandas Perform aggregate calculations on selected subsets of data Produce attractive and useful visualizations that make your data come alive Pandas Workout hones your pandas skills to a professional-level through two hundred exercises, each designed to strengthen your pandas skills. You&’ll test your abilities against common pandas challenges such as importing and exporting, data cleaning, visualization, and performance optimization. Each exercise utilizes a real-world scenario based on real-world data, from tracking the parking tickets in New York City, to working out which country makes the best wines. You&’ll soon find your pandas skills becoming second nature—no more trips to StackOverflow for what is now a natural part of your skillset. About the technology Python&’s pandas library can massively reduce the time you spend analyzing, cleaning, exploring, and manipulating data. And the only path to pandas mastery is practice, practice, and, you guessed it, more practice. In this book, Python guru Reuven Lerner is your personal trainer and guide through over 200 exercises guaranteed to boost your pandas skills. About the book Pandas Workout is a thoughtful collection of practice problems, challenges, and mini-projects designed to build your data analysis skills using Python and pandas. The workouts use realistic data from many sources: the New York taxi fleet, Olympic athletes, SAT scores, oil prices, and more. Each can be completed in ten minutes or less. You&’ll explore pandas&’ rich functionality for string and date/time handling, complex indexing, and visualization, along with practical tips for every stage of a data analysis project. What's inside Clean data with less manual labor Retrieving and assigning data Process and manipulate text Calculations on selected data subsets About the reader For Python programmers and data analysts. About the author Reuven M. Lerner teaches Python and data science around the world and publishes the &“Bamboo Weekly&” newsletter. He is the author of Manning&’s Python Workout (2020). Table of Contents 1 Series 2 Data frames 3 Importing and exporting data 4 Indexes 5 Cleaning data 6 Grouping, joining, and sorting 7 Advanced grouping, joining, and sorting 8 Midway project 9 Strings 10 Dates and times 11 Visualization 12 Performance 13 Final project

Spring Security in Action, Second Edition (In Action)

by Laurentiu Spilca

Don't let security be an afterthought. Spring Security in Action, Second Edition is your vital companion to robust, secure applications that are protected right from the first line of code.Spring Security in Action, Second Edition is a revised version of the bestselling original, fully updated for Spring Boot 3 and Oauth2/OpenID Connect. In Spring Security in Action, Second Edition you will learn essential security skills including how to: Implement and customize authentication and authorization Set up all components of an OAuth2/OpenID Connect system Utilize CRSF and CORS configurations Secure Spring reactive applications Write tests for security configurations Whether you&’re a beginner or a pro, Spring Security in Action, Second Edition teaches you how to secure your Java applications from the ground up. Author Laurentiu Spilca distills his years of experience as a skilled Java and Spring developer into an indispensable guide to everything security—from authentication and authorization, to testing security configurations. This new edition covers the latest patterns for application-level security in Spring apps, demonstrating how Spring Security simplifies every step of the security process. Foreword by Joe Grandja. About the technology Spring Security makes it much, much easier to secure enterprise-scale Java applications. This powerful framework integrates with Spring apps end to end, with &“secure by design&” principles and ready-to-use features that help you implement robust authorization and authentication and protect against data theft and intrusions. And like everything else in the Spring ecosystem, it&’s free, open source, and backed by the awesome team at VMWare. About the book Spring Security in Action, Second Edition updates this bestselling guide to Spring Security to include deep coverage of OAuth2/OpenID Connect and security configuration using the new SecurityFilterChain. The crystal clear explanations and relevant examples, teach you how to build your own authorization server, configure secure endpoints, and prevent cross-site scripting and request forgery attacks. What's inside Custom authentication and authorization CRSF and CORS configurations Secure Spring reactive applications Write tests for security configurations About the reader For experienced Java and Spring developers. About the author Laurentiu Spilca is a skilled Java and Spring developer and an experienced technology instructor. He is also the author of Manning&’s Spring Start Here and Troubleshooting Java. Table of Contents PART 1 1 Security today 2 Hello, Spring Security PART 2 3 Managing users 4 Managing passwords 5 A web app&’s security begins with filters 6 Implementing authentications PART 3 7 Configuring endpoint-level authorization: Restricting access 8 Configuring endpoint-level authorization: Applying restrictions 9 Configuring CSRF protection 10 Configuring CORS 11 Implementing authorization at the method level 12 Implementing filtering at the method level PART 4 13 What are OAuth 2 and OpenID Connect? 14 Implementing an OAuth 2 authorization server 15 Implementing an OAuth 2 resource server 16 Implementing an OAuth 2 client PART 5 17 Implementing security in reactive applications PART 6 18 Testing security configurations

The Official Horizon Cookbook: Tastes of the Seven Tribes (Gaming)

by Rick Barba Victoria Rosenthal

Take a break from machine-hunting in the wilds, and make the most delicious food of the 31st century, inspired by the post-apocalyptic world of Horizon!You&’ve explored the wicked heat of the Sun Furrows, the icy peaks of the Longroam, and the vast, deadly wilds of the Forbidden West. These locales are filled with danger, but are also rich with enough unique cuisines and flavorful foods to prepare a feast fit for a Sun-King! Now you can cook more than 60 of these delicious meals with Horizon: The Official Cookbook. From spicy Fireclaw stew to mouth-watering Bitterbrew Boar, there&’s a dish for everyone in this cookbook. Don&’t worry about getting lost in the wilds, because your recipes come with expert insight into the world, the people, and the culinary arts of the 31st century. ENTICING NEW LORE: As you explore the delicacies of Horizon&’s many tribes, you&’ll be guided on a journey across Aloy&’s world through the eyes of the Forbidden West&’s beloved cooks Milduf and Pentalla, written together with Guerrilla&’s Narrative team. 60+ DELICIOUS RECIPES: From delectable appetizers to epic entrees, icy refreshments to stomach-warming sides, this cookbook has a recipe for every kind of adventure. STUNNING PHOTOGRAPHY: Beautiful photos bring the dishes of Horizon to life, inspiring experienced chefs and new adventurers alike FIRST EVER OFFICIAL HORIZON COOKBOOK: Adventure into the wilds and explore the delicacies of this delicious and dangerous world

R for the Rest of Us: A Statistics-Free Introduction

by David Keyes

Learn how to use R for everything from workload automation and creating online reports, to interpreting data, map making, and more.Written by the founder of a very popular online training platform for the R programming language!The R programming language is a remarkably powerful tool for data analysis and visualization, but its steep learning curve can be intimidating for some. If you just want to automate repetitive tasks or visualize your data, without the need for complex math, R for the Rest of Us is for you.Inside you&’ll find a crash course in R, a quick tour of the RStudio programming environment, and a collection of real-word applications that you can put to use right away. You&’ll learn how to create informative visualizations, streamline report generation, and develop interactive websites—whether you&’re a seasoned R user or have never written a line of R code.You&’ll also learn how to:• Manipulate, clean, and parse your data with tidyverse packages like dplyr and tidyr to make data science operations more user-friendly• Create stunning and customized plots, graphs, and charts with ggplot2 to effectively communicate your data insights• Import geospatial data and write code to produce visually appealing maps automatically• Generate dynamic reports, presentations, and interactive websites with R Markdown and Quarto that seamlessly integrate code, text, and graphics• Develop custom functions and packages tailored to your specific needs, allowing you to extend R&’s functionality and automate complex tasksUnlock a treasure trove of techniques to transform the way you work. With R for the Rest of Us, you&’ll discover the power of R to get stuff done. No advanced statistics degree required.

Video-Based Action Research: A Guide to Incorporating Video Analysis Into Reflective Practice for Teacher Development

by Kimberly Lebak

This book introduces the use of video analysis into the popular educational research model of action research. Video analysis has become increasingly common in teacher development for reflective practice, as well as within the teacher certification process as an assessment tool. Kimberly Lebak builds on this use of video with a model that integrates the opportunities afforded by action research and video analysis for meaningful teacher development. Her "how-to" guide brings the theoretical and practical together to show teachers how video can be a concrete artifact for unpacking and reflecting on the complexities inherent in educational contexts.Chapter content helps readers bridge the gap between research and practice. Examples of tools that can be used for getting started with video-based action research are embedded in the chapters, including planning tools to help pinpoint opportunities for using video to identify a meaningful research topic and develop a data collection plan and action plan; and reflective tools for viewing the videos from multiple perspectives. Teacher vignettes further cement the applicability of the video-based action research model.This book is ideal for use by teachers at all stages of their careers, including pre-service teachers just embarking on their careers and in-service teachers looking to examine and improve their practices along with the learning of their students. It will have an additional benefit in teacher education programs as well as in undergraduate- or graduate-level action research courses by academic researchers and teacher educators.

Refine Search

Showing 54,201 through 54,225 of 54,311 results