Browse Results

Showing 39,676 through 39,700 of 54,425 results

Practical Handbook for Professional Investigators

by Rory J. McMahon CLI CFE Randy Dickson

The third edition of this popular volume continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including insurance fraud, fire and arson investigation; indicators of online marital infidelity; obtaining governmental reports; service of subpoenas for witnesses in federal courts; the Rules of Professional Conduct; niche markets in the investigative industry; and managing and marketing an investigative practice.

A Practical Introduction to Computer Vision with OpenCV

by Kenneth Dawson-Howe

Explains the theory behind basic computer vision and provides a bridge from the theory to practical implementation using the industry standard OpenCV librariesComputer Vision is a rapidly expanding area and it is becoming progressively easier for developers to make use of this field due to the ready availability of high quality libraries (such as OpenCV 2). This text is intended to facilitate the practical use of computer vision with the goal being to bridge the gap between the theory and the practical implementation of computer vision. The book will explain how to use the relevant OpenCV library routines and will be accompanied by a full working program including the code snippets from the text. This textbook is a heavily illustrated, practical introduction to an exciting field, the applications of which are becoming almost ubiquitous. We are now surrounded by cameras, for example cameras on computers & tablets/ cameras built into our mobile phones/ cameras in games consoles; cameras imaging difficult modalities (such as ultrasound, X-ray, MRI) in hospitals, and surveillance cameras. This book is concerned with helping the next generation of computer developers to make use of all these images in order to develop systems which are more intuitive and interact with us in more intelligent ways. Explains the theory behind basic computer vision and provides a bridge from the theory to practical implementation using the industry standard OpenCV librariesOffers an introduction to computer vision, with enough theory to make clear how the various algorithms work but with an emphasis on practical programming issuesProvides enough material for a one semester course in computer vision at senior undergraduate and Masters levels Includes the basics of cameras and images and image processing to remove noise, before moving on to topics such as image histogramming; binary imaging; video processing to detect and model moving objects; geometric operations & camera models; edge detection; features detection; recognition in imagesContains a large number of vision application problems to provide students with the opportunity to solve real problems. Images or videos for these problems are provided in the resources associated with this book which include an enhanced eBook

Practical IPv6 for Windows Administrators

by Edward Horley

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. This book is especially written with the goal of translating your current expertise in IPv4 into the new realm of IPv6. Special attention is given to dual-stack configurations, helping you to run IPv4 and IPv6 side-by-side and support both protocol versions during a transition period. Practical IPv6 for Windows Administrators is also a fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment. Provides a quick path from IPv4 expertise to IPv6 implementation Gives best-practices specific to Windows on IPv6 and dual stack networks Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn Understand IPv6 addressing and how it works in Windows Implement best practices involving IPv6 for Exchange, IIS, and SharePoint Manage IPv6 from PowerShell and the Windows Advanced Firewall Deploy IPv6 from virtual networking environments such as in Hyper-V Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions. Table of Contents IPv6: The Big Picture IPv6 Support in Windows IPv6 Addressing IPv6 Best Practices in Windows IPv6 and PowerShell IPv6 and Advanced Firewall IPv6 in Hyper-V and Virtual Networking IPv6 and DNS IPv6 and DHCP Miscellaneous IPv6 Items

Practical Iterative Learning Control with Frequency Domain Design and Sampled Data Implementation

by Danwei Wang Yongqiang Ye Bin Zhang

This book is on the iterative learning control (ILC) with focus on the design and implementation. We approach the ILC design based on the frequency domain analysis and address the ILC implementation based on the sampled data methods. This is the first book of ILC from frequency domain and sampled data methodologies. The frequency domain design methods offer ILC users insights to the convergence performance which is of practical benefits. This book presents a comprehensive framework with various methodologies to ensure the learnable bandwidth in the ILC system to be set with a balance between learning performance and learning stability. The sampled data implementation ensures effective execution of ILC in practical dynamic systems. The presented sampled data ILC methods also ensure the balance of performance and stability of learning process. Furthermore, the presented theories and methodologies are tested with an ILC controlled robotic system. The experimental results show that the machines can work in much higher accuracy than a feedback control alone can offer. With the proposed ILC algorithms, it is possible that machines can work to their hardware design limits set by sensors and actuators. The target audience for this book includes scientists, engineers and practitioners involved in any systems with repetitive operations.

Practical LaTeX

by George Grätzer

Practical LaTeX covers the material that is needed for everyday LaTeX documents. This accessible manual is friendly, easy to read, and is designed to be as portable as LaTeX itself. A short chapter, Mission Impossible, introduces LaTeX documents and presentations. Read these 30 pages; you then should be able to compose your own work in LaTeX The remainder of the book delves deeper into the topics outlined in Mission Impossible while avoiding technical subjects. Chapters on presentations and illustrations are a highlight, as is the introduction of LaTeX on an iPad. Students, faculty, and professionals in the worlds of mathematics and technology will benefit greatly from this new, practical introduction to LaTeX. George Grätzer, author of More Math into LaTeX (now in its 4th edition) and First Steps in LaTeX, has been a LaTeX guru for over a quarter of century. From the reviews of More Math into LaTeX: ``There are several LaTeX guides, but this one wins hands down for the elegance of its approach and breadth of coverage. '' --Amazon. com, Best of 2000, Editors Choice ``A very helpful and useful tool for all scientists and engineers. '' --Review of Astronomical Tools``A novice reader will be able to learn the most essential features of LaTeX sufficient to begin typesetting papers within a few hours of time. . . An experienced TeX user, on the other hand, will find a systematic and detailed discussion of all LaTeX features, supporting software, and many other advanced technical issues. '' --Reports on Mathematical Physics

Practical Machine Learning: A New Look at Anomaly Detection

by Ellen Friedman Ted Dunning

Finding Data Anomalies You Didn't Know to Look ForAnomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what "suspects" you're looking for. This O'Reilly report uses practical examples to explain how the underlying concepts of anomaly detection work.From banking security to natural sciences, medicine, and marketing, anomaly detection has many useful applications in this age of big data. And the search for anomalies will intensify once the Internet of Things spawns even more new types of data. The concepts described in this report will help you tackle anomaly detection in your own project.Use probabilistic models to predict what's normal and contrast that to what you observeSet an adaptive threshold to determine which data falls outside of the normal range, using the t-digest algorithmEstablish normal fluctuations in complex systems and signals (such as an EKG) with a more adaptive probablistic modelUse historical data to discover anomalies in sporadic event streams, such as web trafficLearn how to use deviations in expected behavior to trigger fraud alerts

Practical Machine Learning: A New Look at Anomaly Detection

by Ellen Friedman Ted Dunning

Finding Data Anomalies You Didn't Know to Look For. Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what “suspects” you’re looking for. This O’Reilly report uses practical examples to explain how the underlying concepts of anomaly detection work.From banking security to natural sciences, medicine, and marketing, anomaly detection has many useful applications in this age of big data. And the search for anomalies will intensify once the Internet of Things spawns even more new types of data. The concepts described in this report will help you tackle anomaly detection in your own project. Use probabilistic models to predict what’s normal and contrast that to what you observe; Set an adaptive threshold to determine which data falls outside of the normal range, using the t-digest algorithm; Establish normal fluctuations in complex systems and signals (such as an EKG) with a more adaptive probablistic model; Use historical data to discover anomalies in sporadic event streams, such as web traffic; Learn how to use deviations in expected behavior to trigger fraud alerts.

Practical Machine Learning: Innovations in Recommendation

by Ted Dunning Ellen Friedman

Building a simple but powerful recommendation system is much easier than you think. Approachable for all levels of expertise, this report explains innovations that make machine learning practical for business production settings--and demonstrates how even a small-scale development team can design an effective large-scale recommendation system.Apache Mahout committers Ted Dunning and Ellen Friedman walk you through a design that relies on careful simplification. You'll learn how to collect the right data, analyze it with an algorithm from the Mahout library, and then easily deploy the recommender using search technology, such as Apache Solr or Elasticsearch. Powerful and effective, this efficient combination does learning offline and delivers rapid response recommendations in real time.Understand the tradeoffs between simple and complex recommendersCollect user data that tracks user actions--rather than their ratingsPredict what a user wants based on behavior by others, using Mahoutfor co-occurrence analysisUse search technology to offer recommendations in real time, complete with item metadataWatch the recommender in action with a music service exampleImprove your recommender with dithering, multimodal recommendation, and other techniques

Practical Maya Programming with Python

by Robert Galanakis

"Practical Maya Programming with Python" is a practical tutorial packed with plenty of examples and sample projects which guides you through building reusable, independent modules and handling unexpected errors. If you are a developer looking to build a powerful system using Python and Maya's capabilities, then this book is for you. Practical Maya Programming with Python is perfect for intermediate users with basic experience in Python and Maya who want to better their knowledge and skills.

Practical Mobile Forensics

by Satish Bommisetty Heather Mahalik Rohit Tamma

The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.

Practical Node.js

by Azat Mardan

Practical Node. js is your step-by-step guide to learning how to build a wide range of scalable real-world web applications using a professional development toolkit. Node. js is an innovative and highly efficient platform for creating web services. But Node. js doesn't live in a vacuum! In a modern web development, many different components need to be put together -- routing, database driver, ORM, session management, OAuth, HTML template engine, CSS compiler and many more. If you already know the basics of Node. js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages. As a web developer, you'll work with a varied collection of standards and frameworks - Practical Node. js shows you how all those pieces fit together. Practical Node. js takes you from installing all the necessary modules to writing full-stack web applications by harnessing the power of the Express. js and Hapi frameworks, the MongoDB database with Mongoskin and Mongoose, Jade and Handlebars template engines, Stylus and LESS CSS languages, OAuth and Everyauth libraries, and the Socket. IO and Derby libraries, and everything in between. The book also covers how to deploy to Heroku and AWS, daemonize apps, and write REST APIs. You'll build full-stack real-world Node. js apps from scratch, and also discover how to write your own Node. js modules and publish them on NPM. You already know what Node. js is; now learn what you can do with it and how far you can take it! What you'll learn Manipulate data from the mongo console Use the Mongoskin and Mongoose MongoDB libraries Build REST API servers with Express and Hapi Deploy apps to Heroku and AWS Test services with Mocha, Expect and TravisCI Utilize sessions for authentication Implement a third-party OAuth strategy with Everyauth Apply Redis, domains, WebSockets, and clusters Write your own Node. js module, and publish it on NPM Who this book is for Practical Node. js is for web developers who have some familiarity with the basics of Node. js and want to learn how to use it to build apps in a professional environment. Table of Contents Setting Up Node. js and Other Essentials Using Express. js to Create Rapid Node. js Web Apps TDD and BDD for Node. js with Mocha Template Engines: Jade and Handlebars Persistence with MongoDB and Mongoskin Using Sessions and OAuth to Authorize and Authenticate Users in Node. js Apps Boosting Your Node. js Data with the Mongoose ORM Library Building a Node. js REST API Server App Realtime Apps with WebSockets, Socket. IO, and Derby JS Getting Node. js Apps Production Ready Deploying Node. js Apps Publishing a Node. js Module and Contributing Back to the Project

Practical Oracle Database Appliance

by Bobby Curtis Fuad Arshad Erik Benner Maris Elsins Matt Gallagher Pete Sharman Yury Velikanov

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration. Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various configurations in order to realize your performance requirements. Manage and monitor the appliance to meet business requirements. Protect your data through proper backup and recovery procedures. Oracle Database is one of the most relied-up databases in industry. For many years Oracle Database was a software product that had to be installed and configured at no small expense. The Oracle Database Appliance makes Oracle Database into a plug-and-play proposition: Plug the appliance into the wall socket, and turn it on. That's it. You have a running database server. This book takes you through that beginning point and beyond, helping you to realize in your own organization the ease of deployment and management represented by the appliance. Covers the Oracle Database Appliance from architecture through configuration. Provides a technical resource for system- and database administrators. Examines practical use cases for the Oracle Database Appliance. What you'll learn Assemble the Oracle Database Appliance. Understand the architecture and its implications for deployment. Configure network access and protect against intrusion. Monitor and troubleshoot the appliance. Identify and choose options for good performance. Diagnose problems and install patch sets when needed. Who this book is for Practical Oracle Database Appliance is for the Oracle database administrator or system administrator who currently manages, or will be implementing, the Oracle Database Appliance within a small- to medium-size business, or who is using the virtualization feature set to deploy numerous appliances within a large enterprise having many branch locations. Table of Contents Oracle Database Appliance Integrated Lights Out Management Installation Database Configuration Networking Monitoring the Oracle Database Appliance Diagnosing the Oracle Database Appliance Patching the Oracle Database Appliance Business Values for the ODA Virtualization and the ODA e-Business Suite and the ODA Oracle Enterprise Manager and the ODA

Practical Reverse Engineering: Using X86, X64, Arm, Windows Kernel, And Reversing Tools

by Bruce Dang Alexandre Gazet Elias Bachaalany

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

Practical Software Development Techniques

by Edward Crookshanks

This book provides an overview of tools and techniques used in enterprise software development, many of which are not taught in academic programs or learned on the job. This is an ideal resource containing lots of practical information and code examples that you need to master as a member of an enterprise development team. This book aggregates many of these "on the job" tools and techniques into a concise format and presents them as both discussion topics and with code examples. The reader will not only get an overview of these tools and techniques, but also several discussions concerning operational aspects of enterprise software development and how it differs from smaller development efforts. For example, in the chapter on Design Patterns and Architecture, the author describes the basics of design patterns but only highlights those that are more important in enterprise applications due to separation of duties, enterprise security, etc. The architecture discussion revolves has a similar emphasis - different teams may manage different aspects of the application''s components with little or no access to the developer. This aspect of restricted access is also mentioned in the section on logging. Theory of logging and discussions of what to log are briefly mentioned, the configuration of the logging tools is demonstrated along with a discussion of why it''s very important in an enterprise environment. What you''ll learn Version control in a team environment Debugging, logging, and refactoring Unit testing, build tools, continuous integration An overview of business and functional requirements Enterprise design patterns and architecture Who this book is for Student and software developers who are new to enterprise environments and recent graduates who want to convert their academic experience into real-world skills. It is assumed that the reader is familiar with Java, . NET, C++ or another high-level programming language. The reader should also be familiar with the differences between console applications, GUI applications and service/daemon applications. Table of Contents 1: Version Control 2: Unit Testing and Test Driven Development 3: Refactoring 4: Build Tools and Continuous Integration 5: Debugging 6: Development Methodologies and SDLC 7: Design Patterns and Architecture 8: Software Requirements 9: Just Enough SQL Appendix A: Enterprise Considerations and Other Topics Appendix B: Discussion Questions Appendix C: Database details Appendix D: Bibliography

Practical Zendesk Administration

by Anton De Young Stafford Vaughan

Implementing the Zendesk customer service software as part of your company's operations can be time-consuming, but with the best practices and advice in this hands-on guide, you can shorten the procedure considerably. You'll learn the purpose, benefits, and pitfalls of each Zendesk feature, with examples of how to configure it to match your company's needs and processes.Written by written by two experienced Zendesk product trainers, this book is distilled from years of working in the trenches, launching customer implementations, and answering thousands of questions from participants throughout the world. With it, you'll be able to determine the best way to put Zendesk's vast potential to work for your company.Apply custom branding to your user-facing support portalMitigate risk by implementing various Zendesk security featuresManage profiles and permissions for users, agents, and administratorsCreate tickets from email, voice, chat, feedback tabs, and social mediaCapture and classify help requests through standard and custom fieldsUse techniques to build an efficient agent support processAutomate your business rules in Zendesk to streamline your workflowProvide your customers with self-service support

Practitioner's Knowledge Representation

by Emilia Mendes

The main goal of this book is to help organizations improve their effort estimates and effort estimation processes by providing a step-by-step methodology that takes them through the creation and validation of models that are based on their own knowledge and experience. Such models, once validated, can then be used to obtain predictions, carry out risk analyses, enhance their estimation processes for new projects and generally advance them as learning organizations. Emilia Mendes presents the Expert-Based Knowledge Engineering of Bayesian Networks (EKEBNs) methodology, which she has used and adapted during the course of several industry collaborations with different companies world-wide over more than 6 years. The book itself consists of two major parts: first, the methodology's foundations in knowledge management, effort estimation (with special emphasis on the intricacies of software and Web development) and Bayesian networks are detailed; then six industry case studies are presented which illustrate the practical use of EKEBNs. Domain experts from each company participated in the elicitation of the bespoke models for effort estimation and all models were built employing the widely-used Netica (tm) tool. This part is rounded off with a chapter summarizing the experiences with the methodology and the derived models. Practitioners working on software project management, software process quality or effort estimation and risk analysis in general will find a thorough introduction into an industry-proven methodology as well as numerous experiences, tips and possible pitfalls invaluable for their daily work.

Predicting Real World Behaviors from Virtual World Data

by Muhammad Aurangzeb Ahmad Cuihua Shen Jaideep Srivastava Noshir Contractor

There is a growing body of literature that focuses on the similarities and differences between how people behave in the offline world vs. how they behave in these virtual environments. Data mining has aided in discovering interesting insights with respect to how people behave in these virtual environments. The book addresses prediction, mining and analysis of offline characteristics and behaviors from online data and vice versa. Each chapter will focus on a different aspect of virtual worlds to real world prediction e. g. , demographics, personality, location, etc.

Predictive Analytics, Data Mining and Big Data

by Steven Finlay

This in-depth guide provides managers with a solid understanding of data and data trends, the opportunities that it can offer to businesses, and the dangers of these technologies. Written in an accessible style, Steven Finlay provides a contextual roadmap for developing solutions that deliver benefits to organizations.

Preparing for Life in a Digital Age: The IEA International Computer and Information Literacy Study International Report

by Julian Fraillon John Ainley Wolfram Schulz Tim Friedman Eveline Gebhardt

Ability to use information and communication technologies (ICT) is an imperative for effective participation in today's digital age. Schools worldwide are responding to the need to provide young people with that ability. But how effective are they in this regard? The IEA International Computer and Information Literacy Study (ICILS) responded to this question by studying the extent to which young people have developed computer and information literacy (CIL), which is defined as the ability to use computers to investigate, create and communicate with others at home, school, the workplace and in society. The study was conducted under the auspices of the International Association for the Evaluation of Educational Achievement (IEA) and builds on a series of earlier IEA studies focusing on ICT in education. Data were gathered from almost 60,000 Grade 8 students in more than 3,300 schools from 21 education systems. This information was augmented by data from almost 35,000 teachers in those schools and by contextual data collected from school ICT-coordinators, school principals and the ICILS national research centers. The IEA ICILS team systematically investigated differences among the participating countries in students' CIL outcomes, how participating countries were providing CIL-related education and how confident teachers were in using ICT in their pedagogical practice. The team also explored differences within and across countries with respect to relationships between CIL education outcomes and student characteristics and school contexts. In general, the study findings presented in this international report challenge the notion of young people as "digital natives" with a self-developed capacity to use digital technology. The large variations in CIL proficiency within and across the ICILS countries suggest it is naive to expect young people to develop CIL in the absence of coherent learning programs. Findings also indicate that system- and school-level planning needs to focus on increasing teacher expertise in using ICT for pedagogical purposes if such programs are to have the desired effect. The report furthermore presents an empirically derived scale and description of CIL learning that educational stakeholders can reference when deliberating about CIL education and use to monitor change in CIL over time.

Presentation Zen Design: A Simple Visual Approach to Presenting in Today's World (Second Edition)

by Garr Reynolds

Presentation and design lessons are all around us, even in something as seemingly unrelated as a beautifully prepared traditional Japanese meal. A few years ago on a late fall afternoon, a friend and I were walking along Tetsugaku no Michi (Philosopher's Road) in the city of Kyoto.

PrestaShop Module Development

by Fabien Serny

If you are a developer who is new to PrestaShop and wants to get a good foundation in development on the PrestaShop framework, this book is for you. It's assumed that you will have some experience with PHP5, jQuery, and HTML/CSS (no need to be an expert on it).

Prezi Essentials

by Domi Sinclair

If you want to learn Prezi, and specifically design within Prezi, this is the book for you. Perhaps you already know a bit about Prezi but have never used it, or perhaps you have used Prezi before but want to learn how to incorporate your own custom design elements. In either case, this book will get you up and running quickly. It would be helpful to have a bit of familiarity with basic design concepts and the use of Prezi, but prior experience is not essential.

Prezi HOTSHOT

by Hedwyg Van Groenendaal

This book takes a hands-on, tutorial-style approach that walks you through ten individual projects, each focusing on producing a specific Prezi. If you have some basic experience of Prezi and want to gain advanced knowledge by building different kinds of Prezi projects, then this book is for you.

Pricing, Online Marketing Behavior, and Analytics

by Giampaolo Viglia

Behavioral Pricing, Online Marketing Behavior, and Analytics covers many different aspects of how online marketing works and its continuous evolution.

PrimeFaces Blueprints

by Ramkumar Pillai Sudheer Jonna

If you are a Java developer with experience of frontend UI development, and want to take the plunge to develop stunning UI applications with the most popular JSF framework, PrimeFaces, then this book is for you. For those with entrepreneurial aspirations, this book will provide valuable insights into how to utilize successful business models.

Refine Search

Showing 39,676 through 39,700 of 54,425 results