Browse Results

Showing 54,201 through 54,225 of 54,311 results

25 Years of Ed Tech (Issues in Distance Education)

by Martin Weller

In this lively and approachable volume based on his popular blog series, Martin Weller demonstrates a rich history of innovation and effective implementation of ed tech across higher education. From Bulletin Board Systems to blockchain, Weller follows the trajectory of education by focusing each chapter on a technology, theory, or concept that has influenced each year since 1994. Calling for both caution and enthusiasm, Weller advocates for a critical and research-based approach to new technologies, particularly in light of disinformation, the impact of social media on politics, and data surveillance trends. A concise and necessary retrospective, this book will be valuable to educators, ed tech practitioners, and higher education administrators, as well as students.

25 Recipes for Getting Started with R: Excerpts from the R Cookbook

by Paul Teetor

R is a powerful tool for statistics and graphics, but getting started with this language can be frustrating. This short, concise book provides beginners with a selection of how-to recipes to solve simple problems with R. Each solution gives you just what you need to know to use R for basic statistics, graphics, and regression. You'll find recipes on reading data files, creating data frames, computing basic statistics, testing means and correlations, creating a scatter plot, performing simple linear regression, and many more. These solutions were selected from O'Reilly's R Cookbook, which contains more than 200 recipes for R that you'll find useful once you move beyond the basics.

24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them

by Michael Howard David LeBlanc John Viega

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

24/7 Politics: Cable Television and the Fragmenting of America from Watergate to Fox News (Politics and Society in Modern America #148)

by Kathryn Cramer Brownell

How cable television upended American political life in the pursuit of profits and influenceAs television began to overtake the political landscape in the 1960s, network broadcast companies, bolstered by powerful lobbying interests, dominated screens across the nation. Yet over the next three decades, the expansion of a different technology, cable, changed all of this. 24/7 Politics tells the story of how the cable industry worked with political leaders to create an entirely new approach to television, one that tethered politics to profits and divided and distracted Americans by feeding their appetite for entertainment—frequently at the expense of fostering responsible citizenship.In this timely and provocative book, Kathryn Cramer Brownell argues that cable television itself is not to blame for today’s rampant polarization and scandal politics—the intentional restructuring of television as a political institution is. She describes how cable innovations—from C-SPAN coverage of congressional debates in the 1980s to MTV’s foray into presidential politics in the 1990s—took on network broadcasting using market forces, giving rise to a more decentralized media world. Brownell shows how cable became an unstoppable medium for political communication that prioritized cult followings and loyalty to individual brands, fundamentally reshaped party politics, and, in the process, sowed the seeds of democratic upheaval.24/7 Politics reveals how cable TV created new possibilities for antiestablishment voices and opened a pathway to political prominence for seemingly unlikely figures like Donald Trump by playing to narrow audiences and cultivating division instead of common ground.

21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies

by Maurizio Martellini Ralf Trapp

This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks.21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials – whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare – these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively.The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a “softer”, broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.

The 21st Century in 100 Games (Games and Contemporary Culture)

by Aditya Deshbandhu

The 21st Century in 100 Games is an interactive public history of the contemporary world. It creates a ludological retelling of the 21st century through 100 games that were announced, launched, and played from the turn of the century. The book analyzes them and then uses the games as a means of entry to examine both key events in the 21st century and the evolution of the gaming industry. Adopting a tri-pronged perspective — the reviewer, the academic, and an industry observer — it studies games as ludo-narratological artefacts and resituates games in a societal context by examining how they affect and are engaged with by players, reviewers, the gaming community, and the larger gaming industry.This book will be a must read for readers interested in video games, new media, digital culture (s), culture studies, and history.

21st Century Chinese Cyberwarfare

by William T. Hagestad II

21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author s personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage. This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People's Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.

21st Century C

by Ben Klemens

Throw out your old ideas of C, and relearn a programming language that's substantially outgrown its origins. With 21st Century C, you'll discover up-to-date techniques that are absent from every other C text available. C isn't just the foundation of modern programming languages, it is a modern language, ideal for writing efficient, state-of-the-art applications. Learn to dump old habits that made sense on mainframes, and pick up the tools you need to use this evolved and aggressively simple language. No matter what programming language you currently champion, you'll agree that C rocks. Set up a C programming environment with shell facilities, makefiles, text editors, debuggers, and memory checkers Use Autotools, C's de facto cross-platform package manager Learn which older C concepts should be downplayed or deprecated Explore problematic C concepts that are too useful to throw out Solve C's string-building problems with C-standard and POSIX-standard functions Use modern syntactic features for functions that take structured inputs Build high-level object-based libraries and programs Apply existing C libraries for doing advanced math, talking to Internet servers, and running databases

21st Century C: C Tips from the New School

by Ben Klemens

Throw out your old ideas about C and get to know a programming language that’s substantially outgrown its origins. With this revised edition of 21st Century C, you’ll discover up-to-date techniques missing from other C tutorials, whether you’re new to the language or just getting reacquainted.C isn’t just the foundation of modern programming languages; it is a modern language, ideal for writing efficient, state-of-the-art applications. Get past idioms that made sense on mainframes and learn the tools you need to work with this evolved and aggressively simple language. No matter what programming language you currently favor, you’ll quickly see that 21st century C rocks.Set up a C programming environment with shell facilities, makefiles, text editors, debuggers, and memory checkersUse Autotools, C’s de facto cross-platform package managerLearn about the problematic C concepts too useful to discardSolve C’s string-building problems with C-standard functionsUse modern syntactic features for functions that take structured inputsBuild high-level, object-based libraries and programsPerform advanced math, talk to internet servers, and run databases with existing C librariesThis edition also includes new material on concurrent threads, virtual tables, C99 numeric types, and other features.

21 Recipes for Mining Twitter: Distilling Rich Information from Messy Data

by Matthew A. Russell

Millions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to: Use OAuth to access Twitter data Create and analyze graphs of retweet relationships Use the streaming API to harvest tweets in realtime Harvest and analyze friends and followers Discover friendship cliques Summarize webpages from short URLs This book is a perfect companion to O'Reilly's Mining the Social Web.

2030 - Strategieentwicklung für Innovation Leaders: Mit Handlungsanweisungen unter Einbezug neuester Methoden der Datennutzung

by Philipp Futterknecht Tobias Hertfelder

Seit der Relativitätstheorie wissen wir, dass massereiche Objekte durch ihre Gravitation Dinge anziehen. Je größer die Masse desto größer ist auch die Anziehungskraft. Genauso verhält es sich auch in Strategieprojekten. Jeder Projektteilnehmer ist dabei ein massereicher Teilnehmer und hat Auswirkungen auf das Zusammenspiel. Was sich gravierend geändert hat ist der Einfluss der Daten auf diesen Prozess. Wer dies nicht berücksichtigt, wird in Zukunft enorme Einbußen hinnehmen müssen. Da sich durch diese Veränderung ein neues Gleichgewicht einstellt, ändern sich auch die Erfolgsaussichten der angewandten Methoden und Verhaltensweisen. Wie Sie diesen Wandel meistern können und was Sie dazu benötigen erfahren Sie in diesem Buch.

2023 4th International Conference on E-Commerce and Internet Technology (Atlantis Highlights in Engineering #18)

by Vilas Gaikar Bijay Kumar Kandel Hrushikesh Mallick

This is an open access book.E-commerce is a commercial activity centered on commodity exchange by means of information network technology. In the open network environment of the Internet, based on the client/server application method, buyers and sellers carry out various commercial activities online, realizing online shopping for consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities of a new business operation mode. It is the electronicization, networking and informatization of all aspects of traditional business activities.Internet technology is the prerequisite for e-commerce to be realized. The development and popularization of Internet technology has also played a positive role in promoting the development of e-commerce. Internet technology is a double-edged sword, with advantages and disadvantages, since it can promote the development of e-commerce, it may also affect its normal construction, such as the existence of theft of information, tampering with information, counterfeiting, malicious damage and other security risks, but also through the firewall technology, data encryption technology, authentication technology, digital signature technology and other technologies to regulate the transaction process.Therefore, the influence of the two is mutual, and only through continuous friction can we continuously promote the development of both sides in a benign direction.ECIT 2023 provides a platform in order toCreate a forum for sharing, research and exchange at the international level, so that participants can be informed of the latest research directions, results and contents of applied Internet technologies on e-commerce, thus stimulating them to generate new research ideas.Promote the development of e-commerce by studying its problems.To open up new perspectives, broaden horizons and examine the issues under discussion by the participants.Each accepted article requires at least one author to attend the meeting and present it.

2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (Smart Innovation, Systems and Technologies #314)

by George A. Tsihrintzis Shiuh-Jeng Wang Iuon-Chang Lin

This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.

The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2021 Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #97)

by John Macintyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2021 Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #98)

by John Macintyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #102)

by Mohammed Atiquzzaman Neil Yen Zheng Xu

This book gathers a selection of peer-reviewed papers presented at the third Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2021) conference, held in Shanghai, China, on Nov. 27, 2021. The contributions, prepared by an international team of scientists and engineers, cover the latest advances made in the field of machine learning, and big data analytics methods and approaches for the data-driven co-design of communication, computing, and control for smart cities. Given its scope, it offers a valuable resource for all researchers and professionals interested in big data, smart cities, and cyber-physical systems.

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #103)

by Mohammed Atiquzzaman Neil Yen Zheng Xu

This book gathers a selection of peer-reviewed papers presented at the third Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2021) conference, held in Shanghai, China, on Nov. 27, 2021. The contributions, prepared by an international team of scientists and engineers, cover the latest advances made in the field of machine learning, and big data analytics methods and approaches for the data-driven co-design of communication, computing, and control for smart cities. Given its scope, it offers a valuable resource for all researchers and professionals interested in big data, smart cities, and cyber-physical systems.

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1 (Advances in Intelligent Systems and Computing #1398)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #81)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 1. Highlights recent applications and techniques in cyber intelligence2. Includes the proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021) 3. Presents a broad range of scientific research on cyber intelligence

2020 Vision: Turbocharge Your Business Today to Thrive in Tomorrow's Economy

by Stan Davis Bill Davidson

Information management and biotechnology are reshaping the basic structure of American enterprise. In this bold and innovative analysis, Davis and Davidson explain what these changes mean and how entrepreneurs and executives can prepare challenges of tomorrow.

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing #1282)

by John MacIntyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing #1283)

by John MacIntyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020 (Advances in Intelligent Systems and Computing #1379)

by Chuanchao Huang Yu-Wei Chan Neil Yen

This book covers cutting-edge and advanced research on data processing techniques and applications for cyber-physical systems, gathering the proceedings of the International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2020), held in Laibin City, Guangxi Province, China, on December 11–12, 2020. It examines a wide range of topics, including distributed processing for sensor data in CPS networks; approximate reasoning and pattern recognition for CPS networks; data platforms for efficient integration with CPS networks; machine learning algorithms for CPS networks; and data security and privacy in CPS networks. Outlining promising future research directions, the book offers a valuable resource for students, researchers, and professionals alike, while also providing a useful reference guide for newcomers to the field.

2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020) (Advances in Intelligent Systems and Computing #1244)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Zheng Xu Mohammed Atiquzzaman

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

The 2019 Yearbook of the Digital Ethics Lab (Digital Ethics Lab Yearbook)

by Christopher Burr Silvia Milano

This edited volume presents an overview of cutting-edge research areas within digital ethics as defined by the Digital Ethics Lab of the University of Oxford. It identifies new challenges and opportunities of influence in setting the research agenda in the field.The yearbook presents research on the following topics: conceptual metaphor theory, cybersecurity governance, cyber conflicts, anthropomorphism in AI, digital technologies for mental healthcare, data ethics in the asylum process, AI’s legitimacy and democratic deficit, digital afterlife industry, automatic prayer bots, foresight analysis and the future of AI. This volume appeals to students, researchers and professionals.

Refine Search

Showing 54,201 through 54,225 of 54,311 results