Browse Results

Showing 16,626 through 16,650 of 61,842 results

Deepfakes und Recht: Einführung in den deutschen Rechtsrahmen für synthetische Medien (essentials)

by Martina Block

Welche Möglichkeiten gibt es, sich vor den Gefahren von Deepfakes – also künstlich erstellten oder manipulierten Inhalten – zu schützen? In diesem Buch werden Anwendungsbereiche von Deepfakes dargestellt und die technischen Grundlagen zur Erstellung und Aufdeckung von Deepfakes vorgestellt.Es wird eine Einordnung in die verschiedenen Bereiche des deutschen Rechts (allgemeines Zivilrecht, Urheberrecht und Strafrecht) vorgenommen. Hierbei liegt ein besonderes Augenmerk darauf, welche Rechtsschutzmöglichkeiten Betroffenen – also Personen, die gegen ihren Willen abgebildet werden – zustehen und welche Hindernisse bei der Durchsetzung dieser Ansprüche bestehen können. Anschließend wird der Entwurf für eine europäische Verordnung über Künstliche Intelligenz (AI Act) – mit einem Fokus auf die für Deepfakes geltenden Offenlegungsvorschriften – vorgestellt.

Deepfakes: A Realistic Assessment of Potentials, Risks, and Policy Regulation (SpringerBriefs in Political Science)

by Ignas Kalpokas Julija Kalpokiene

This book examines the use and potential impact of deepfakes, a type of synthetic computer-generated media, primarily images and videos, capable of both creating artificial representations of non-existent individuals and showing actual individuals doing things they did not do. As such, deepfakes pose an obvious threat of manipulation and, unsurprisingly, have been the subject of a great deal of alarmism in both the news media and academic articles. Hence, this book sets out to critically evaluate potential threats by analyzing human susceptibility to manipulation and using that as a backdrop for a discussion of actual and likely uses of deepfakes. In contrast to the usual threat narrative, this book will put forward a multi-sided picture of deepfakes, exploring their potential and that of adjacent technologies for creative use in domains ranging from film and advertisement to painting. The challenges posed by deepfakes are further evaluated with regard to present or forthcoming legislation and other regulatory measures. Finally, deepfakes are placed within a broader cultural and philosophical context, focusing primarily on posthumanist thought. Therefore, this book is a must-read for researchers, students, and practitioners of political science and other disciplines, interested in a better understanding of deepfakes.

Deer Hunter 2014 Guia de Jogo

by Joshua Abbott Gerlon de Jesus Magalhães Santos

Com o "Deer Hunter 2014 - Guia de Jogo" você vai aprender exatamente o que você precisa saber para se tornar um jogador experiente e baixar tudo de graça! Meu guia abrange os seguintes tópicos: - Visão geral e Informações Básicas. - Como jogar o jogo. - Ter energia imilitada e gratuitamente. - Visão geral das armas - Estratégias de caça. - Dicas profissionais e Estratégias. - Estratégias para todas as missões! - Segredos, dicas e truques usados pelos jogadores profissionais! - Detalhes de Instruções passo a passo! - Jogo Geral e Estratégias Geral. - Como vencer o jogo. - E muito mais! Compre agora e nunca mais fique preso em nível, tentando bate-lo! Torne-se ainda hoje um Jogador de alto nível! Aviso Legal: Este produto não está associado, afiliado, endossado ou patrocinado pela Glu Mobile Inc, nem foram revistos e testados ou certificado por Glu Mobile Inc. Este guia é para ser usado como uma referência. Isso não modificar ou alterar o jogo de qualquer maneira. Este é um guia e não escrito um programa de software. Tipo: Jogos / Videogames

Defending Cyber Systems through Reverse Engineering of Criminal Malware (SpringerBriefs in Computer Science)

by Marwan Omar

This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks.This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program’s behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.

Defending IoT Infrastructures with the Raspberry Pi: Monitoring And Detecting Nefarious Behavior In Real Time

by Chet Hosmer

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You’ll Learn Create a secure, operational Raspberry Pi IoT sensorConfigure and train the sensor using “normal” IoT behaviorEstablish analytics for detecting aberrant activitiesGenerate real-time alerts to preempt attacksIdentify and report data-leakage events originating from IoT devicesDevelop custom Python applications for cybersecurity Who This Book Is For Cybersecurity specialists, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, software developers and engineers developing new cybersecurity defenses, incident response teams, software developers and engineers in general, and hobbyists wanting to expand the application of Raspberry Pi into both IoT and cybersecurity

Defending the Metaverse: Cybersecurity Strategies for the Next Generation Internet (Advances in Cybersecurity Management)

by Ravi Sheth

This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts. This book is for everyone—from beginners to experts, researchers, and students. It offers insights and tools suitable for people with different levels of knowledge, making it accessible to a wide range of readers. The book fits alongside other published books by addressing the rapidly evolving intersection of cybersecurity and the Metaverse, a niche yet increasingly critical area.Unlike traditional cybersecurity books that focus on current internet and IT infrastructures, this book uniquely targets the virtual environments of the Metaverse. It combines advanced technological insights with practical strategies, providing a specialized resource that bridges the gap between conventional cybersecurity literature and the futuristic needs of Metaverse security. This positions it as an essential read for those looking to stay ahead in the field of cybersecurity within the context of next-generation internet platforms.

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

by Jesse Varsalone Matthew McFadden

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

Defensive Security Handbook: Best Practices for Securing Infrastructure

by Amanda Berlin Lee Brotherston

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Defensive Security Handbook: Best Practices for Securing Infrastructure

by Amanda Berlin Lee Brotherston William F. Reyor III

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you:Plan and design incident response, disaster recovery, compliance, and physical securityLearn and apply basic penetration-testing concepts through purple teamingConduct vulnerability management using automated processes and toolsUse IDS, IPS, SOC, logging, and monitoringBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkReduce exploitable errors by developing code securely

Defensive Tactics for Today’s Law Enforcement

by Stephen K. Hayes Joe Niehaus

Few of the many defensive tactics books on the market include the training and methods of martial arts. Drawing on the centuries-old techniques of Ninjutsu, Defensive Tactics for Today’s Law Enforcement offers alternatives to the traditional police defensive tactics taught to most officers. This text stresses relying on natural tendencies in a violent encounter to ensure officer safety and to better utilize the techniques and training officers do receive. By integrating existing training with martial arts expertise, Defensive Tactics provides officers access a full complement of techniques to better navigate physical conflict safely and effectively. Intended for law enforcement practitioners, as well as practitioners of any other professions that present a personal security risk, Defensive Tactics for Today’s Law Enforcement will better equip readers with a diverse range of defensive tactics.

Defining Enterprise Data and Analytics Strategy: Pragmatic Guidance on Defining Strategy Based on Successful Digital Transformation Experience of Multiple Fortune 500 and Other Global Companies (Management for Professionals)

by Prakash Sah

This is the first of its kind book that describes key elements of enterprise data and analytics strategy, and prescribes a pragmatic approach to define the strategy for large enterprises. The book is based on successful digital transformation experience of multiple Fortune 500 and other large enterprises. It is estimated that more than 50% of data and analytics initiatives fail globally because of the inherent complexity of such initiatives. Some of the questions that enterprises struggle with are: How to define enterprise data and analytics strategy? What are the key elements that should be considered while doing so? Why one-size-fits-all approach does not work for all enterprises? How to align data and analytics initiative with the business strategy of the CEO? How to establish a futuristic technology and architecture foundation, given the exponential rate of innovation in data and analytics technologies? How to define the right data and analytics organization model? Why data and analytics organization and processes need to be different from other functions? How to manage organizational change to ensure success of data and analytics initiative? How to define a business value measurement framework and calculate ROI from data and analytics initiative? What are the key skills required in a data and analytics leader to wade through political and other challenges of a large enterprise? This book will help executives, chief digital/analytics officers, data and analytics professionals, and consultants, in answering the above questions. It will help them in addressing various dilemmas that they face every day and making their enterprises data-driven.

Defining and Deploying Software Processes

by F. Alan Goodman

Defining and Deploying Software Processes enables you to create efficient and effective processes that let you better manage project schedules and software quality. The author's organized approach details how to deploy processes into your company's culture that are enthusiastically embraced by employees, and explains how to implement a Web-based pr

Deformable Registration Techniques for Thoracic CT Images: An Insight into Medical Image Registration

by Ali Imam Abidi S.K. Singh

This book focuses on novel approaches for thoracic computed tomography (CT) image registration and determination of respiratory motion models in a range of patient scenarios. It discusses the use of image registration processes to remove the inconsistencies between medical images acquired using different devices. In the context of comparative research and medical analysis, these methods are of immense value in image registration procedures, not just for thoracic CT images, but for all types of medical images in multiple modalities, and also in establishing a mean respiration motion model. Combined with advanced techniques, the methods proposed have the potential to advance the field of computer vision and help improve existing methods. The book is a valuable resource for those in the scientific community involved in modeling respiratory motion for a large number of people.

Defying Reality: The Inside Story of the Virtual Reality Revolution

by David M. Ewalt

A fascinating exploration of the history, development, and future of virtual reality, a technology with world-changing potential, written by award-winning journalist and author David Ewalt, stemming from his 2015 Forbes cover story about the Oculus Rift and its creator Palmer Luckey.You’ve heard about virtual reality, seen the new gadgets, and read about how VR will be the next big thing. But you probably haven’t yet realized the extent to which this technology will change the way we live. We used to be bound to a physical reality, but new immersive computer simulations allow us to escape our homes and bodies. Suddenly anyone can see what it’s like to stand on the peak of Mount Everest. A person who can’t walk can experience a marathon from the perspective of an Olympic champion. And why stop there? Become a dragon and fly through the universe. But it’s not only about spectacle. Virtual and augmented reality will impact nearly every aspect of our lives—commerce, medicine, politics—the applications are infinite. It may sound like science fiction, but this vision of the future drives billions of dollars in business and is a top priority for such companies as Facebook, Google, and Sony. Yet little is known about the history of these technologies. In Defying Reality, David M. Ewalt traces the story from ancient amphitheaters to Cold War military laboratories, through decades of hype and failure, to a nineteen-year-old video game aficionado who made the impossible possible. Ewalt looks at how businesses are already using this tech to revolutionize the world around us, and what we can expect in the future. Writing for a mainstream audience as well as for technology enthusiasts, Ewalt offers a unique perspective on VR. With firsthand accounts and on-the-ground reporting, Defying Reality shows how virtual reality will change our work, our play, and the way we relate to one another.

Dehumanization of Warfare: Legal Implications of New Weapon Technologies

by Wolff Heintschel von Heinegg Robert Frau Tassilo Singer

This book addresses the technological evolution of modern warfare due to unmanned systems and the growing capacity for cyberwarfare. The increasing involvement of unmanned means and methods of warfare can lead to a total removal of humans from the navigation, command and decision-making processes in the control of unmanned systems, and as such away from participation in hostilities - the "dehumanization of warfare. " This raises the question of whether and how today's law is suitable for governing the dehumanization of warfare effectively. Which rules are relevant? Do interpretations of relevant rules need to be reviewed or is further and adapted regulation necessary? Moreover, ethical reasoning and computer science developments also have to be taken into account in identifying problems. Adopting an interdisciplinary approach the book focuses primarily on international humanitarian law, with related ethics and computer science aspects included in the discussion and the analysis.

Delaunay Mesh Generation (Chapman & Hall/CRC Computer and Information Science Series)

by Siu-Wing Cheng Tamal K. Dey Jonathan Shewchuk

Written by authors at the forefront of modern algorithms research, Delaunay Mesh Generation demonstrates the power and versatility of Delaunay meshers in tackling complex geometric domains ranging from polyhedra with internal boundaries to piecewise smooth surfaces. Covering both volume and surface meshes, the authors fully explain how and why thes

Delay Tolerant Networks

by Shui Yu Longxiang Gao Tom H. Luan Wanlei Zhou

This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

Delay Tolerant Networks: Protocols and Applications

by Athanasios V. Vasilakos Yan Zhang Thrasyvoulos Spyropoulos

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applicat

Delay and Disruption Tolerant Networks: Interplanetary and Earth-Bound -- Architecture, Protocols, and Applications

by Aloizio Pereira da Silva, Scott Burleigh and Katia Obraczka

Delay- and Disruption Tolerant Networks (DTNs) are networks subject to arbitrarily long-lived disruptions in connectivity and therefore cannot guarantee end-to-end connectivity at all times. Consequently DTNs called for novel core networking protocols since most existing Internet protocols rely on the network’s ability to maintain end-to-end communication between participating nodes. This book presents the fundamental principles that underline DTNs. It explains the state-of-the-art on DTNs, their architecture, protocols, and applications. It also explores DTN’s future technological trends and applications. Its main goal is to serve as a reference for researchers and practitioners.

Delete

by Viktor Mayer-Schönberger

Delete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all. In Delete, Viktor Mayer-Schönberger traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances. The written word made it possible for humans to remember across generations and time, yet now digital technology and global networks are overriding our natural ability to forget--the past is ever present, ready to be called up at the click of a mouse. Mayer-Schönberger examines the technology that's facilitating the end of forgetting--digitization, cheap storage and easy retrieval, global access, and increasingly powerful software--and describes the dangers of everlasting digital memory, whether it's outdated information taken out of context or compromising photos the Web won't let us forget. He explains why information privacy rights and other fixes can't help us, and proposes an ingeniously simple solution--expiration dates on information--that may. Delete is an eye-opening book that will help us remember how to forget in the digital age.

Delete: The Virtue of Forgetting in the Digital Age

by Viktor Mayer-Schönberger

The hazards of perfect memory in the digital ageDelete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all.In Delete, Viktor Mayer-Schönberger traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances. The written word made it possible for humans to remember across generations and time, yet now digital technology and global networks are overriding our natural ability to forget—the past is ever present, ready to be called up at the click of a mouse. Mayer-Schönberger examines the technology that's facilitating the end of forgetting—digitization, cheap storage and easy retrieval, global access, and increasingly powerful software—and describes the dangers of everlasting digital memory, whether it's outdated information taken out of context or compromising photos the Web won't let us forget. He explains why information privacy rights and other fixes can't help us, and proposes an ingeniously simple solution—expiration dates on information—that may.Delete is an eye-opening book that will help us remember how to forget in the digital age.

Deliver Audacious Web Apps with Ember 2

by Matthew White

It's time for web development to be fun again, time to write engaging and attractive apps--fast--in this brisk tutorial. Build a complete user interface in a few lines of code, create reusable web components, access RESTful services and cache the results for performance, and use JavaScript modules to bring abstraction to your code. Find out how you can get your crucial app infrastructure up and running quickly, so you can spend your time on the stuff great apps are made of: features.With its 2.0 release, the Ember JavaScript framework has taken a major step forward. In this book, you'll learn these new features: how to use module-driven development with Ember CLI, take advantage of the new DOM-based rendering engine, and use a service-based architecture to make your apps flexible, not brittle.Use the Ember CLI to build your app using module-focused JavaScript classes with a clear project structure. Learn how to use Ember's routing classes to organize your app, write web components that marry your user interface and logic without leaky access to state, and read and write data from RESTful services with almost no code. Make use of services to encapsulate logic and inject it throughout your app, and use Ember CLI to rapidly iterate changes, deploy locally, test your code, and build for production. You'll learn all the essentials of working with Ember.If you're tired of feeling limited by your web development tools, unleash your ambition and start creating ambitious web applications with Ember.What You Need:You need Ember, Ember CLI, Google Chrome or Mozilla Firefox, and a text editor.

Delivering Applications with VMware App Volumes 4: Delivering Application Layers to Virtual Desktops Using VMware

by Peter von Oven

Acquire the skills to build an App Volumes environment for a proof of concept, a pilot, or a live production environment. Delivering Applications with VMware App Volumes 4 starts with an in-depth overview of where the solution fits within the market and its key features, introducing you to application layering and VMware App Volumes. Next, it explains how to install the software and use its management consoles to configure App Volumes. You will understand how to build and configure application layers for delivery and will learn to build and configure writeable volumes for user data and user-installed applications. In the advanced management section, you will learn to customize package templates and integrate App Volumes with JMP. Along the way you will understand how to deliver published apps in MS RemoteApp using layered apps for scalability. In the next phase of the book you will install and configure App Volumes for different use cases: VMware Horizon View, VMware ThinApp, Microsoft RDSH, and Citrix Virtual Apps and Desktops. Throughout the chapters, you will be given hints and tips, along with best practices, all seen from the eyes of somebody who works with this technology day in, day out, and in many different types of environments and scenarios. What You Will Learn Understand the App Volumes architecture Master the concept of application layeringWork with App Volumes, application packages, and Writable Volumes Who This Book Is For VMware professionals, system integrators, IT professionals, and consultants.

Delivering Data Analytics: A Step-By-Step Guide to Driving Adoption of Business Intelligence from Planning to Launch

by Nicholas Kelly

The importance of data analytics is well known, but how can you get end users to engage with analytics and business intelligence (BI) when adoption of new technology can be frustratingly slow or may not happen at all? Avoid wasting time on dashboards and reports that no one uses with this practical guide to increasing analytics adoption by focusing on people and process, not technology. Pulling together agile, UX and change management principles, Delivering Data Analytics outlines a step-by-step, technology agnostic process designed to shift the organizational data culture and gain buy-in from users and stakeholders at every stage of the project. This book outlines how to succeed and build trust with stakeholders amid the politics, ambiguity and lack of engagement in business. With case studies, templates, checklists and scripts based on the author's considerable experience in analytics and data visualisation, this book covers the full cycle from requirements gathering and data assessment to training and launch. Ensure lasting adoption, trust and, most importantly, actionable business value with this roadmap to creating user-centric analytics projects.

Delivering IT and eBusiness Value

by Leslie Willcocks Valerie Graeser

'Delivering Business Value from IT' is focused on the evaluation issue in IT and how IT evaluation can proceed across the life-cycle of any IT investment and be linked positively to improving business performance. Chapters 1,2 and 3 detail an approach to IT evaluation whilst chapters 4 and 5 build on these by showing two distinctive approaches to linking IT to business performance. The remaining three chapters deal with a range of evaluation issues emerging as important - specifically Internet evaluation, Y2K and beyond, EMU, quality outsourcing, infrastructure, role of benchmarking, and cost of ownership issues that practitioners regularly encounter.

Refine Search

Showing 16,626 through 16,650 of 61,842 results