Browse Results

Showing 21,676 through 21,700 of 59,427 results

Field Guide to Hadoop: An Introduction to Hadoop, Its Ecosystem, and Aligned Technologies

by Kevin Sitto Marshall Presser

If your organization is about to enter the world of big data, you not only need to decide whether Apache Hadoop is the right platform to use, but also which of its many components are best suited to your task. This field guide makes the exercise manageable by breaking down the Hadoop ecosystem into short, digestible sections. You’ll quickly understand how Hadoop’s projects, subprojects, and related technologies work together.Each chapter introduces a different topic—such as core technologies or data transfer—and explains why certain components may or may not be useful for particular needs. When it comes to data, Hadoop is a whole new ballgame, but with this handy reference, you’ll have a good grasp of the playing field.Topics include:Core technologies—Hadoop Distributed File System (HDFS), MapReduce, YARN, and SparkDatabase and data management—Cassandra, HBase, MongoDB, and HiveSerialization—Avro, JSON, and ParquetManagement and monitoring—Puppet, Chef, Zookeeper, and OozieAnalytic helpers—Pig, Mahout, and MLLibData transfer—Scoop, Flume, distcp, and StormSecurity, access control, auditing—Sentry, Kerberos, and KnoxCloud computing and virtualization—Serengeti, Docker, and Whirr

Field Informatics

by Toru Ishida

Here we use the term "field" to refer to a sphere of practical operation, and correspondingly the term "field informatics" describes informatics tools and methodologies that arise in the field. The components of field informatics are description, prediction, design and transfer, and the methods for those components vary widely. For example, we consider the social goal of revitalizing a mountainous area experiencing depopulation and we show how the tools and methodologies of field informatics may be used to describe such situations using remote sensing, biologging, human sensing and ethnography; the effects of various solutions can be predicted using system dynamics and multiagent simulations; the solutions can be designed using inclusive design or participatory design methods; and finally the experience gained can be transferred using case writing and outreach communication. The authors are specialists in diverse areas such as informatics, engineering, agriculture, sociology and pedagogy, and their areas of interest range from environment conservation to social education for international cooperation. They have a particular focus on the environment in southeast Asia and related topics such as large-scale traffic simulations, participatory workshops, inclusive design workshops, distance learning, and intercultural collaboration. This book targets graduate students seeking tools and methodologies for natural observation, field workers engaged in social participation, and researchers and engineers pursuing innovation. The techniques described in the book could also be exploited by government officials to form consensus and develop activities or by non-profit organizations to undertake more effective social programs.

Field Trip to the Taiga: The Creeper Diaries, An Unofficial Minecrafters Novel, Book Nine (The Creeper Diaries #9)

by Greyson Mann

Did someone say “field trip”? Gerald is all in! He’d much rather be exploring the Taiga than sleeping through science class. His buddy Sam is all about spotting polar bears, but Gerald is having way too much fun building igloos and snow golems. His science teacher says there are only two rules—learn something every day, and stay with the group. (That’s adult speak for “don’t get lost.”) When Gerald discovers a secret trapdoor in an igloo, he doesn’t exactly get lost. But . . . if he’s not careful, his classmates might just lose him!

Fieldbus and Networking in Process Automation

by Sunit Sen

Fieldbuses, particularly wireless fieldbuses, offer a multitude of benefits to process control and automation. Fieldbuses replace point-to-point technology with digital communication networks, offering increased data availability and easier configurability and interoperability. Fieldbus and Networking in Process Automation discusses the newest fieldbuses on the market today, detailing their utilities, components and configurations, wiring and installation methods, commissioning, and safety aspects under hostile environmental conditions. This clear and concise text: Considers the advantages and shortcomings of the most sought after fieldbuses, including HART, Foundation Fieldbus, and Profibus Presents an overview of data communication, networking, cabling, surge protection systems, and device connection techniques Provides comprehensive coverage of intrinsic safety essential to the process control, automation, and chemical industries Describes different wireless standards and their coexistence issues, as well as wireless sensor networks Examines the latest offerings in the wireless networking arena, such as WHART and ISA100.11a Offering a snapshot of the current state of the art, Fieldbus and Networking in Process Automation not only addresses aspects of integration, interoperability, operation, and automation pertaining to fieldbuses, but also encourages readers to explore potential applications in any given industrial environment.

Fieldbus and Networking in Process Automation

by Sunit Kumar Sen

Over the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols. This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book: • Explains basic communication principles and networking—a must for understanding fieldbuses • Considers the advantages and shortcomings of individual fieldbuses • Provides a broad spectrum of different fieldbuses used in both process control and manufacturing industries in a precise and to-the-point manner • Introduces Common Industrial Protocol (CIP), EtherNet/IP, EtherCAT, SERCOS III, Powerlink, and Profinet IRT, which are mostly sought after in control and automation fields • Discusses hard real-time communication in a succinct manner—so essential in today’s multi-axis motor control systems • Updates and streamlines the extra details from the original book to make it more concise and reader friendly Sunit Kumar Sen, a member of IET, holds advanced degrees from St Xavier’s College and University of Calcutta, both in Kolkata, India. He was an ex-professor in the Instrumentation Engineering section of the Department of Applied Physics, University of Calcutta, and taught courses in digital electronics, communication, industrial instrumentation, microprocessors, electrical networks, and fieldbuses. He was the head of the Department of Applied Physics and University Science Instrumentation Center from 2008-2010 at the University of Calcutta. Previously, he was assistant manager, instrumentation (oprn.) at the Bokaro Steel Plant, Jharkhand, India, under the Steel Authority of India (SAIL). He has already written four books in the areas of instrumentation, microprocessors, and industrial automation technologies. He has been published in approximately 70 national and international journals and conferences.

Fields of Logic and Computation III: Essays Dedicated to Yuri Gurevich on the Occasion of His 80th Birthday (Lecture Notes in Computer Science #12180)

by Andreas Blass Patrick Cégielski Nachum Dershowitz Manfred Droste Bernd Finkbeiner

This Festschrift is published in honor of Yuri Gurevich’s 80th birthday. An associated conference, YuriFest 2020, was planned for May 18–20 in Fontainebleau, France, in combination with the 39th Journées sur les Arithmétiques Faibles also celebrating Yuri’s 80th birthday. Because of the coronavirus situation, the conference had to be postponed, but this Festschrift is being published as originally planned. It addresses a very wide variety of topics, but by no means all of the fields of logic and computation in which Yuri has made important progress.

Fields of Practice and Applied Solutions within Distributed Team Cognition

by Michael D. McNeese; Eduardo Salas; Mica R. Endsley

Many different cognitive research approaches have been generated to explore fields of practice where mutual teamwork is present and emergent. Results have shown subtle yet significant findings on how humans actually work together and when they transition from their own individual roles and niches into elements of teamwork and team-to-team work. Fields of Practice and Applied Solutions within Distributed Team Cognition explores the advantages of teams and shows how researchers can obtain a deep understanding of users/teams that are entrenched in a particular field. Interdisciplinary perspectives and transformative intersections are provided. Features Delineates contextual nuances of socio-technical environments as influencers of team cognition Provides quantitative/qualitative perspectives of distributed team cognition by demonstrating in situ interactions Reviews applied teamwork for fields of practice in medicine, cybersecurity, education, aviation, and manufacturing Generates practical examples of distributed work and how cognition develops across teams using technologies Specifies applied solutions through technologies such as robots, agents, games, and social networks

Fields of Vision: Essays in Film Studies, Visual Anthropology, and Photography

by Leslie Devereaux Roger Hillman

Filmed images dominate our time, from the movies and TV that entertain us to the news and documentary that inform us and shape our cultural vocabulary. Crossing disciplinary boundaries, Fields of Vision is a path-breaking collection that inquires into the power (and limits) of film and photography to make sense of ourselves and others. As critics, social scientists, filmmakers, and literary scholars, the contributors converge on the issues of representation and the construction of visual meaning across cultures.From the dismembered bodies of horror film to the exotic bodies of ethnographic film and the gorgeous bodies of romantic cinema, Fields of Vision moves through eras, genres, and societies. Always asking how images work to produce meaning, the essays address the way the "real" on film creates fantasy, news, as well as "science," and considers this problematic process as cultural boundaries are crossed. One essay discusses the effects of Hollywood's high-capital, world-wide commercial hegemony on local and non-Western cinemas, while another explores the response of indigenous people in central Australia to the forces of mass media and video. Other essays uncover the work of the unconscious in cinema, the shaping of "female spectatorship" by the "women's film" genre of the 1920s, and the effects of the personal and subjective in documentary films and the photographs of war reportage.In illuminating dark, elided, or wilfully neglected areas of representation, these essays uncover new fields of vision.

FIFA 16 Guida non Ufficiale

by Giuseppe Pizzuti Joshua Abbott

Con la mia Guida non ufficiale, imparerai tutto ciò che serve sul gioco! Le strategie inserite in questa sono conosciute solo dai migliori giocatori e ti porteranno a un successo veloce all'interno del gioco This Guide Covers the Following: - Strategie per i nuovi arrivati. - Come iniziare. - Costruire una Squadra. - Scegliere i giocatori. - L'Intesa della squadra.. - Come ricevere monete. - Trucchi e suggerimenti per rendere il gioco più facile. - Segreti e suggerimenti usati dai giocatori esperti! - Strategie da attuare nel gioco. - E ALTRO ANCORA! Purchase now and never get stuck trying to beat your opponents! Become a High Score Player Today! Disclaimer: This product is not associated, affiliated, endorsed, reviewed, tested, certified, or sponsored by its original creator, Electronic Arts. This guide is to be used as a reference. This does not modify or alter the game in any way. All contents contained within are to be used at your own risk.

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

by Richard A. Clarke Robert K. Knake

An urgent new warning from two bestselling security experts--and a gripping inside look at how governments, firms, and ordinary citizens can confront and contain the tyrants, hackers, and criminals bent on turning the digital realm into a war zone. "In the battle raging between offense and defense in cyberspace, Clarke and Knake have some important ideas about how we can avoid cyberwar for our country, prevent cybercrime against our companies, and in doing so, reduce resentment, division, and instability at home and abroad."--Bill ClintonThere is much to fear in the dark corners of cyberspace. From well-covered stories like the Stuxnet attack which helped slow Iran's nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in Germany in midair, we have entered an age in which online threats carry real-world consequences. But we do not have to let autocrats and criminals run amok in the digital realm. We now know a great deal about how to make cyberspace far less dangerous--and about how to defend our security, economy, democracy, and privacy from cyber attack. This is a book about the realm in which nobody should ever want to fight a war: the fifth domain, the Pentagon's term for cyberspace. Our guides are two of America's top cybersecurity experts, seasoned practitioners who are as familiar with the White House Situation Room as they are with Fortune 500 boardrooms. Richard A. Clarke and Robert K. Knake offer a vivid, engrossing tour of the often unfamiliar terrain of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats. Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the U.S. intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience"--building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding the trap of overreaction to digital attacks. Above all, Clarke and Knake show us how to keep the fifth domain a humming engine of economic growth and human progress by not giving in to those who would turn it into a wasteland of conflict. Backed by decades of high-level experience in the White House and the private sector, The Fifth Domain delivers a riveting, agenda-setting insider look at what works in the struggle to avoid cyberwar.

Fifth International Conference on Computing and Network Communications: Proceedings of CoCoNet 2023, Volume 1 (Lecture Notes in Electrical Engineering #1219)

by Sabu M. Thampi Patrick Siarry Mohammed Atiquzzaman Ljiljana Trajkovic Jaime Lloret Mauri

This book constitutes thoroughly refereed post-conference proceedings of the 5th International Conference on Computing and Network Communications, CoCoNet'23. The revised papers presented are carefully reviewed and selected from several initial submissions. The scope of the Symposium includes Network-on-Chip Architectures and Applications, Future Internet Architecture and Protocols, Intelligent Networked Systems, IoT and smart cities, Communications Systems Integration and Modelling, and Wireless and Mobile Communications. The book is directed to the researchers and scientists engaged in various fields of network communications.

The Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021 (EAI/Springer Innovations in Communication and Computing)

by Anand Nayyar Anand Paul Sudeep Tanwar

This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT.

Fifty Key Video Games (Routledge Key Guides)

by Bernard Perron Kelly Boudreau Mark J.P. Wolf Dominic Arsenault

This volume examines fifty of the most important video games that have contributed significantly to the history, development, or culture of the medium, providing an overview of video games from their beginning to the present day. This volume covers a variety of historical periods and platforms, genres, commercial impact, artistic choices, contexts of play, typical and atypical representations, uses of games for specific purposes, uses of materials or techniques, specific subcultures, repurposing, transgressive aesthetics, interfaces, moral or ethical impact, and more. Key video games featured include Animal Crossing, Call of Duty, Grand Theft Auto, The Legend of Zelda, Minecraft, PONG, Super Mario Bros., Tetris, and World of Warcraft. Each game is closely analyzed in order to properly contextualize it, to emphasize its prominent features, to show how it creates a unique experience of gameplay, and to outline the ways it might speak about society and culture. The book also acts as a highly accessible showcase to a range of disciplinary perspectives that are found and practiced in the field of game studies. With each entry supplemented by references and suggestions for further reading, Fifty Key Video Games is an indispensable reference for anyone interested in video games.

Fifty Key Video Games (Routledge Key Guides)

by Bernard Perron Kelly Boudreau Mark J.P. Wolf Dominic Arsenault

This volume examines fifty of the most important video games that have contributed significantly to the history, development, or culture of the medium, providing an overview of video games from their beginning to the present day.This volume covers a variety of historical periods and platforms, genres, commercial impact, artistic choices, contexts of play, typical and atypical representations, uses of games for specific purposes, uses of materials or techniques, specific subcultures, repurposing, transgressive aesthetics, interfaces, moral or ethical impact, and more. Key video games featured include Animal Crossing, Call of Duty, Grand Theft Auto, The Legend of Zelda, Minecraft, PONG, Super Mario Bros., Tetris, and World of Warcraft. Each game is closely analyzed in order to properly contextualize it, to emphasize its prominent features, to show how it creates a unique experience of gameplay, and to outline the ways it might speak about society and culture. The book also acts as a highly accessible showcase to a range of disciplinary perspectives that are found and practiced in the field of game studies.With each entry supplemented by references and suggestions for further reading, Fifty Key Video Games is an indispensable reference for anyone interested in video games.

Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders

by Renee Tarun

Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecurity and the role of the CISO—Chief Information Security Officer—becomes ever more apparent. It’s becoming clear that the CISO, which began as a largely technical role, has become nuanced, strategic, and a cross-functional leadership position. Fight Fire with Fire: Proactive Cybersecurity Strategies for Today’s Leaders explores the evolution of the CISO’s responsibilities and delivers a blueprint to effectively improve cybersecurity across an organization. Fight Fire with Fire draws on the deep experience of its many all-star contributors. For example: Learn how to talk effectively with the Board from engineer-turned-executive Marianne Bailey, a top spokesperson well-known for global leadership in cyber Discover how to manage complex cyber supply chain risk with Terry Roberts, who addresses this complex area using cutting-edge technology and emerging standards Tame the exploding IoT threat landscape with Sonia Arista, a CISO with decades of experience across sectors, including healthcare where edge devices monitor vital signs and robots perform surgery These are just a few of the global trailblazers in cybersecurity who have banded together to equip today’s leaders to protect their enterprises and inspire tomorrow’s leaders to join them. With fires blazing on the horizon, there is no time for a seminar or boot camp. Cyber leaders need information at their fingertips. Readers will find insight on how to close the diversity and skills gap and become well-versed in modern cyber threats, including attacks coming from organized crime and nation-states. This book highlights a three-pronged approach that encompasses people, process, and technology to empower everyone to protect their organization. From effective risk management to supply chain security and communicating with the board, Fight Fire with Fire presents discussions from industry leaders that cover every critical competency in information security. Perfect for IT and information security professionals seeking perspectives and insights they can’t find in certification exams or standard textbooks, Fight Fire with Fire is an indispensable resource for everyone hoping to improve their understanding of the realities of modern cybersecurity through the eyes of today’s top security leaders.

Fight for Dusty Divot: An Unofficial Fortnite Novel (Trapped In Battle Royale #5)

by Devin Hunter

Time is running out for Grey and his squad. While they consistently rank in the top twenty players stuck in Fortnite Battle Royale, they need to be the top five to escape virtual reality and go home. Grey’s team begins to fray apart, and he fears he won’t be able to keep them together long enough to get the rank they need. With the season ending in a couple weeks, people are either giving up or fighting harder than ever. When Grey losses another squad member, he’s on the verge of throwing in the towel himself. But to his surprise, the top player, Tae Min, approaches him with a deal that may give them just the chance they need.

The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age

by Danielle Keats Citron

The essential road map for understanding—and defending—your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers and stakeholders across the globe to protect what she calls intimate privacy—encompassing our bodies, health, gender, and relationships. When intimate privacy becomes data, corporations know exactly when to flash that ad for a new drug or pregnancy test. Social and political forces know how to manipulate what you think and who you trust, leveraging sensitive secrets and deepfake videos to ruin or silence opponents. And as new technologies invite new violations, people have power over one another like never before, from revenge porn to blackmail, attaching life-altering risks to growing up, dating online, or falling in love. A masterful new look at privacy in the twenty-first century, The Fight for Privacy takes the focus off Silicon Valley moguls to investigate the price we pay as technology migrates deeper into every aspect of our lives: entering our bedrooms and our bathrooms and our midnight texts; our relationships with friends, family, lovers, and kids; and even our relationship with ourselves. Drawing on in-depth interviews with victims, activists, and advocates, Citron brings this headline issue home for readers by weaving together visceral stories about the countless ways that corporate and individual violators exploit privacy loopholes. Exploring why the law has struggled to keep up, she reveals how our current system leaves victims—particularly women, LGBTQ+ people, and marginalized groups—shamed and powerless while perpetrators profit, warping cultural norms around the world. Yet there is a solution to our toxic relationship with technology and privacy: fighting for intimate privacy as a civil right. Collectively, Citron argues, citizens, lawmakers, and corporations have the power to create a new reality where privacy is valued and people are protected as they embrace what technology offers. Introducing readers to the trailblazing work of advocates today, Citron urges readers to join the fight. Your intimate life shouldn’t be traded for profit or wielded against you for power: it belongs to you. With Citron as our guide, we can take back control of our data and build a better future for the next, ever more digital, generation.

Fight, Magic, Items: The History of Final Fantasy, Dragon Quest, and the Rise of Japanese RPGs in the West

by Aidan Moher

Take a journey through the history of Japanese role-playing games—from the creators who built it, the games that defined it, and the stories that transformed pop culture and continue to capture the imaginations of millions of fans to this day.The Japanese roleplaying game (JRPG) genre is one that is known for bold, unforgettable characters; rich stories, and some of the most iconic and beloved games in the industry. Inspired by early western RPGs and introducing technology and artistic styles that pushed the boundaries of what video games could be, this genre is responsible for creating some of the most complex, bold, and beloved games in history—and it has the fanbase to prove it. In Fight, Magic, Items, Aidan Moher guides readers through the fascinating history of JRPGs, exploring the technical challenges, distinct narrative and artistic visions, and creative rivalries that fueled the creation of countless iconic games and their quest to become the best, not only in Japan, but in North America, too. Moher starts with the origin stories of two classic Nintendo titles, Final Fantasy and Dragon Quest, and immerses readers in the world of JRPGs, following the interconnected history from through the lens of their creators and their stories full of hope, risk, and pixels, from the tiny teams and almost impossible schedules that built the foundations of the Final Fantasy and Dragon Quest franchises; Reiko Kodama pushing the narrative and genre boundaries with Phantasy Star; the unexpected team up between Horii and Sakaguchi to create Chrono Trigger; or the unique mashup of classic Disney with Final Fantasy coolness in Kingdom Hearts. Filled with firsthand interviews and behind-the-scenes looks into the development, reception, and influence of JRPGs, Fight, Magic, Items captures the evolution of the genre and why it continues to grab us, decades after those first iconic pixelated games released.

Fighting Churn with Data: The science and strategy of customer retention

by Carl Gold

The beating heart of any product or service business is returning clients. Don't let your hard-won customers vanish, taking their money with them. In Fighting Churn with Data you'll learn powerful data-driven techniques to maximize customer retention and minimize actions that cause them to stop engaging or unsubscribe altogether.Summary The beating heart of any product or service business is returning clients. Don't let your hard-won customers vanish, taking their money with them. In Fighting Churn with Data you'll learn powerful data-driven techniques to maximize customer retention and minimize actions that cause them to stop engaging or unsubscribe altogether. This hands-on guide is packed with techniques for converting raw data into measurable metrics, testing hypotheses, and presenting findings that are easily understandable to non-technical decision makers. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Keeping customers active and engaged is essential for any business that relies on recurring revenue and repeat sales. Customer turnover—or &“churn&”—is costly, frustrating, and preventable. By applying the techniques in this book, you can identify the warning signs of churn and learn to catch customers before they leave. About the book Fighting Churn with Data teaches developers and data scientists proven techniques for stopping churn before it happens. Packed with real-world use cases and examples, this book teaches you to convert raw data into measurable behavior metrics, calculate customer lifetime value, and improve churn forecasting with demographic data. By following Zuora Chief Data Scientist Carl Gold&’s methods, you&’ll reap the benefits of high customer retention. What's inside Calculating churn metrics Identifying user behavior that predicts churn Using churn reduction tactics with customer segmentation Applying churn analysis techniques to other business areas Using AI for accurate churn forecasting About the reader For readers with basic data analysis skills, including Python and SQL. About the author Carl Gold (PhD) is the Chief Data Scientist at Zuora, Inc., the industry-leading subscription management platform. Table of Contents: PART 1 - BUILDING YOUR ARSENAL 1 The world of churn 2 Measuring churn 3 Measuring customers 4 Observing renewal and churn PART 2 - WAGING THE WAR 5 Understanding churn and behavior with metrics 6 Relationships between customer behaviors 7 Segmenting customers with advanced metrics PART 3 - SPECIAL WEAPONS AND TACTICS 8 Forecasting churn 9 Forecast accuracy and machine learning 10 Churn demographics and firmographics 11 Leading the fight against churn

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

by Roger A. Grimes

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

Fighting Words: The Bold American Journalists Who Brought the World Home Between the Wars

by Nancy F. Cott

From a Harvard historian, this riveting portrait of four trailblazing American journalists highlights the power of the press in the interwar period. In the fragile peace following the Great War, a surprising number of restless young Americans abandoned their homes and set out impulsively to see the changing world. In Fighting Words, Nancy F. Cott follows four who pursued global news -- from contested Palestine to revolutionary China, from Stalin's Moscow to Hitler's Berlin. As foreign correspondents, they became players in international politics and shaped Americans' awareness of critical interwar crises, the spreading menace of European fascism, and the likelihood of a new war -- while living romantic and sexual lives as modern and as hazardous as their journalism. An indelible portrayal of a tumultuous era with resonance for our own, Fighting Words is essential reading on the power of the press and the growth of an American sense of international responsibility.

File Management Made Simple, Windows Edition

by Joseph Moran

Managing data is an essential skill that every PC user should have. Surprisingly though, a large number of users--even highly experienced users--exhibit poor file management skills, resulting in frustration and lost data. File Management Made Simple can resolve this by providing you with the skills and best practices needed for creating, managing and protecting your data. Do any of the following scenarios sound familiar to you? You''ve downloaded an attachment from your e-mail, but aren''t sure where you downloaded it to. You spent an entire evening working on a document only to discover the next morning that you didn''t save it to your flash drive like you thought you had? Unfortunately, for a vast number of PC users, scenarios like these are all too common. These situations are not only extremely frustrating for the user, but also tend to discourage them from ever wanting to touch a PC again! However, these problems and others can be easily rectified with this brief, book, by your side. File Management Made Simple will show you how best to name, manage, and store your files. By using descriptive folders to identify files, you''ll see how easy it is to ensure the data you need is always readily available. Finally this book introduces you to some of the best options for transporting and protecting your data. What you''ll learn * How to navigate your Windows PC like a professional technician * How to move, copy or delete data effectively, efficiently, and safely * Best practices for organizing your files: adjustable strategies that work for any situation How to find anything, quickly, on your hard drive * How to transport or share your data between systems or with other users How to protect your data from loss, theft, or equipment failure Covers Windows versions 7, 8 and 10 Who this book is for The target audience for this book is the person who works on a PC, but other then turning it on and performing the most elementary of tasks, has no idea how to use it. It''s for those people who use the computer every day, but neither want, nor need to know how it all works. These are the people who just want to complete the task at hand and move on with their lives. It will be designed to help users, both young and old, get comfortable with the machine, and give them the confidence they need to manage their data quickly and more efficiently. Table of Contents 1. Let''s Go Exploring 2. Working With Files 3. Keeping Files and Folders Organized 4. Managing and Protecting Files With User Accounts 5. Managing and Reclaiming Disk Space 6. Working With File Types and an Programs (Apps) 7. Searching for Files 8. Cloud Storage and Transporting Files 9. Managing Open Files and Windows 10. Sharing Files on a Home Network 11. Backing up Your Files 12. Keeping You Personal Data Secure Via Encryption 13. Transfer Your Files to a New PC 14. Properly Disposing of an Old PC

File System Forensics

by Fergus Toolan

Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. It provides a step-by-step approach for file content and metadata recovery to allow the reader to manually recreate and validate results from file system forensic tools. The book includes a supporting website that shares all of the data (i.e. sample file systems) used for demonstration in the text and provides teaching resources such as instructor guides, extra material, and more. Written by a highly qualified associate professor and consultant in the field, File System Forensics includes information on: The necessary concepts required to understand file system forensics for anyone with basic computing experienceFile systems specific to Windows, Linux, and macOS, with coverage of FAT, ExFAT, and NTFSAdvanced topics such as deleted file recovery, fragmented file recovery, searching for particular files, links, checkpoints, snapshots, and RAIDIssues facing file system forensics today and various issues that might evolve in the field in the coming years File System Forensics is an essential, up-to-date reference on the subject for graduate and senior undergraduate students in digital forensics, as well as digital forensic analysts and other law enforcement professionals.

FileMaker Pro 10: The Missing Manual (Missing Manual)

by Susan Prosser Geoff Coffey

The FileMaker Pro 10 desktop database lets you do almost anything with the information you give it -- especially with this book as your guide. Clear, thorough, and accessible, FileMaker Pro 10: The Missing Manual helps you get in, build your database, and get the results you need, whether you're running a business, pursuing a hobby, or planning your retirement. It's the ideal guide for non-technical and experienced folks alike.Each chapter in this fully updated edition covers the latest timesaving features of FileMaker Pro 10, including saved finds and a redesigned toolbar that reveals information and features more clearly than ever. You'll learn how to import information from the new Bento consumer database (Mac only), write scripts to make your database even easier to use, and send email without leaving FileMaker.With this book, you will:Get your first database running in minutes and perform basic tasks right awayCatalog people, processes, and things with streamlined data entry and sorting toolsUse your data to generate reports, correspondence, and other documents with easeCreate, connect, and manage multiple tables and set up complex relationships that display just the data you needCrunch numbers, search text, or pin down dates and times with dozens of built-in formulasOutfit your database for the Web, and import and export data to other formatsYou'll also get objective advice on which features are really useful, and which aren't. To make the most of this database, you need FileMaker Pro 10: The Missing Manual -- the book that should have been in the box.

FileMaker Pro 10 Bible

by Ray Cologon

FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons with other database development tools; a broad discussion of integration with existing systems and software) through the building-blocks of FileMaker solutions, and on up to state-of-the-art advice on concepts of optimization, modularization, innovative and sophisticated user-interface design, dynamic elements, logic, cutting-edge calculations, publishing your database to the Web, and integrating tightly with SQL databases via "ESS". The book also includes the special developer tools available in FileMaker Pro Advanced, and covers topics too oft skipped over in other books on the market -- backup how-to's and strategies, must-read information about good database husbandry and file recovery, and so on. Much of the information in the book is documented nowhere else. This is the one must-have FileMaker book!Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Refine Search

Showing 21,676 through 21,700 of 59,427 results