- Table View
- List View
Finitely Generated Abelian Groups and Similarity of Matrices over a Field
by Christopher NormanAt first sight, finitely generated abelian groups and canonical forms of matrices appear to have little in common. However, reduction to Smith normal form, named after its originator H.J.S.Smith in 1861, is a matrix version of the Euclidean algorithm and is exactly what the theory requires in both cases. Starting with matrices over the integers, Part 1 of this book provides a measured introduction to such groups: two finitely generated abelian groups are isomorphic if and only if their invariant factor sequences are identical. The analogous theory of matrix similarity over a field is then developed in Part 2 starting with matrices having polynomial entries: two matrices over a field are similar if and only if their rational canonical forms are equal. Under certain conditions each matrix is similar to a diagonal or nearly diagonal matrix, namely its Jordan form. The reader is assumed to be familiar with the elementary properties of rings and fields. Also a knowledge of abstract linear algebra including vector spaces, linear mappings, matrices, bases and dimension is essential, although much of the theory is covered in the text but from a more general standpoint: the role of vector spaces is widened to modules over commutative rings. Based on a lecture course taught by the author for nearly thirty years, the book emphasises algorithmic techniques and features numerous worked examples and exercises with solutions. The early chapters form an ideal second course in algebra for second and third year undergraduates. The later chapters, which cover closely related topics, e.g. field extensions, endomorphism rings, automorphism groups, and variants of the canonical forms, will appeal to more advanced students. The book is a bridge between linear and abstract algebra.
Fintech and Cryptocurrency
by Mohd Naved V. Ajantha Devi Aditya Kumar GuptaFINTECH and CRYPTOCURRENCY Dive into the world of fintech and cryptocurrency through the engaging perspectives of this diverse group of authors and uncover the intricate connections between technology, finance, and cryptocurrency that make this a must-have for anyone intrigued by the future of digital society. Digital currencies, decentralization of money, and the growth of new technologies like blockchain, the Internet of Things, and machine learning have produced new opportunities and difficulties for banking and finance, as well as users of these services in electronic commerce. New banking and finance technologies may improve operational efficiency, risk management, compliance, and client pleasure, but they can decrease barriers and introduce new concerns, such as cybersecurity risk. Cryptocurrencies with smart contracts for payments and trading, as well as AI systems with adaptive algorithms that allow picture and speech recognition, expert judgement, group categorization, and forecasting in a variety of fields, are instances of increased automation. Simultaneously, the potentials pose risks and raise regulatory concerns. The rise of blockchain technology and its widespread use have had a significant impact on the operation and management of digital systems. At the same time, researchers and practitioners have paid close attention to digital finance. Blockchain’s first applications were limited to the production of digital currency, but it has now been expanded to include financial and commercial applications. Innovative digital finance has had a huge impact on business and society since it has been extensively adopted by businesses and consumers. As a result, the goal of this edited book is to expand and deepen our knowledge of the business possibilities of novel blockchain and digital financial applications.
Fintech and the Emerging Ecosystems: Exploring Centralised and Decentralised Financial Technologies (Financial Innovation and Technology)
by Alex Zarifis Xusen ChengFinancial technologies, commonly referred to as Fintech, are revolutionizing and reorganizing the financial sector. This digital transformation profoundly impacts society and influences our everyday lives in numerous ways, as financial services intersect with various other services we utilize. This book offers contributions from leading researchers in the field, providing a comprehensive understanding of this multifaceted transformation. It encompasses emerging financial technologies such as cryptoassets, including Bitcoin and Non-Fungible Tokens (NFTs), Decentralized Finance (DeFi), Central Bank Digital Currencies (CBDCs), and the growing significance of Artificial Intelligence (AI) and Generative AI. While the primary audience comprises researchers and academics, practitioners and students can also glean practical insights from its contents. Chapters "A Model of Trust in Central Bank Digital Currency (CBDC) in Brazil: How Trust in a Two-Tier CBDC with Both the Central and Retail Banks Involved Changes Consumer Trust" and "Building Trust in AI: Leadership Insights from Malaysian Fintech Boards" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Fintech for ESG and the Circular Economy
by Prasenjit Chatterjee Vinay Kandpal Peterson K. Ozili Ernesto D.R. Santibanez GonzalezThis book showcases research, theoretical, and validated work associated with digital finance to enhance the quality of a more sustainable environment. The primary objective of Fintech for ESG and the Circular Economy is to evaluate how fintech advancements and sustainable practices effectively drive transformative and sustainable change. It aims to motivate individuals with ideas and discussions to promote financial technology and foster creativity for a more sustainable and equitable future. The book delves into the intersection of technology and sustainability, offering insights into how big data, machine learning, and blockchain technology are transforming ESG practices and the circular economy. It highlights the potential of FinTech to drive sustainable finance, explores the current role of cyber ecosystems and digital currencies in sustainable finance, and examines the intricate legal landscape surrounding green finance in India. The book also discusses the influence of ESG factors on financial decision-making and the integration of sustainability metrics into financial analysis, supported by examples of how companies and investors are adopting these practices. Additionally, the book explores the role of financial institutions in enabling crowdfunding platforms, particularly in African markets, and provides case studies that demonstrate their impact on financial inclusion and entrepreneurship. It also analyzes the legal implications of blockchain and smart contracts within FinTech, the convergence of digital business models with ESG principles, and the role of digital currencies in promoting financial inclusion and sustainable economic growth, particularly in India. The book concludes with an exploration of tokenomics and its potential to incentivize sustainable behaviors, and examines how digital finance innovations in Tanzania are improving financial inclusion by overcoming barriers to financial services for the unbanked population. Audience This book will be of interest to scholars, researchers, academicians, and students of commerce, banking, finance, sustainability, and financial technology. This book is helpful for business professionals, researchers, and technical industry workers in finance and artificial intelligence.
Fintech with Artificial Intelligence, Big Data, and Blockchain (Blockchain Technologies)
by Paul Moon Sub Choi Seth H. HuangThis book introduces readers to recent advancements in financial technologies. The contents cover some of the state-of-the-art fields in financial technology, practice, and research associated with artificial intelligence, big data, and blockchain—all of which are transforming the nature of how products and services are designed and delivered, making less adaptable institutions fast become obsolete. The book provides the fundamental framework, research insights, and empirical evidence in the efficacy of these new technologies, employing practical and academic approaches to help professionals and academics reach innovative solutions and grow competitive strengths.
Fire Detection in Warehouse Facilities
by Daniel T. Gottuk Joshua DinaburgAutomatic sprinklers systems are the primary fire protection system in warehouse and storage facilities. The effectiveness of this strategy has come into question due to the challenges presented by modern warehouse facilities, including increased storage heights and areas, automated storage retrieval systems (ASRS), limitations on water supplies, and changes in firefighting strategies. The application of fire detection devices used to provide early warning and notification of incipient warehouse fire events is being considered as a component of modern warehouse fire protection. Fire Detection in Warehouse Facilities provides technical information to aid in the development of guidelines and standards for the use of fire detection technologies for modern warehouse fire protection. The authors share their thorough literature review, analyze characteristic fire hazards for modern warehouse facilities, and identify information gaps in the field. The book concludes with recommendations for the development of guidelines and standards for the use of detection technologies in warehouse fire protection design, including a research plan for implementation. This book is intended for practitioners seeking an understanding of the issues surrounding warehouse design and fire protection. The book will also prove valuable for fire hazard researchers and those involved with fire department response, applicable detection systems, and fire growth suppression.
Fire Flow Water Consumption in Sprinklered and Unsprinklered Buildings: An Assessment of Community Impacts
by Inc. Code ConsultantsFire Flow Water Consumption in Sprinklered and Unsprinklered Buildings offers a detailed analysis for calculating the fire water demand required in buildings with existing and non-existant sprinkler systems. The installation of automatic sprinkler systems can significantly reduce the amount of water needed during a fire, but it requires water for commissioning, inspection, testing, and maintenance (CITM). This book provides an estimate of fire water used under both fire conditions, including CITM, to allow communities to develop fire water fees for both sprinklered and unsprinklered buildings that are proportional to the anticipated fire water usage. The types of buildings analyzed include residential (family dwellings as well as those up to four stories in height), business, assembly, institutional, mercantile, and storage facilities. Water volume was studied using guidelines from the International Code Council, the National Fire Protection Association, and the Insurance Services Office. Fire Flow Water Consumption in Sprinklered and Unsprinklered Buildings is intended for practitioners as a tool for analyzing water consumption in fire situations and for providing them with key information on the best types of water systems in a variety of buildings. Researchers working in building planning and safety will also find the book valuable.
Fire Phone: A get-started-now guide to Firefly, Mayday, Dynamic Perspective, and other new features
by Brian SawyerDive straight into hot Fire phone features you won’t find in any other device—like Firefly, Mayday, and Dynamic Perspective—with this concise hands-on guide. You probably already know how to make calls, text, and take photos with Amazon’s new phone, but where it really shines is in innovative features you’ve never even seen before. This intuitive, easy-to-follow book opens a world of possibilities with the Fire phone, right out of the box.Instantly identify and order just about any product with Firefly—from DVDs, CDs, and books (or their electronic equivalents) to nearly anything else with a barcodeUse Mayday to get live, hands-on tech support and customer service right on your phoneImmerse yourself in 3D games, maps, and apps with the Dynamic Perspective sensor systemNavigate easily with new one-handed (and no-handed!) gestures found only on Fire phone
Fire Safety Challenges of Green Buildings
by Brian Meacham Brandon Poole Raymond Cheng Juan EcheverriaEnvironmental concerns and advances in architectural technologies have lead to a greater number of green buildings or buildings with green, eco-friendly elements. However, from a practical standpoint, there is no incident reporting system in the world that tracks data on fire incidents in green buildings. Fire safety objectives are not explicitly considered in most green rating schemes, and green design features have been associated with photovoltaic panels and roof materials, lightweight timber frame buildings, and combustible insulation materials. Fire Safety Challenges of Green Buildings is the result of an extensive global literature review that sought to identify issues related to green building elements or features and ways to ensure those issues are tracked for future improvement. The book identifies actual incidents of fires in green buildings or involving green building elements, points out issues with green building elements that would increase fire risk, clarifies reports and studies that address ways to reduce fire risk in green design elements, and compares research studies that explicitly incorporate fire safety into green building design. The authors also pinpoint gaps and specific research needs associated with understanding and addressing fire risk and hazards with green building design. Using their data, the authors developed a set of matrices relating these green attributes and potential fire hazards. With these comprehensive tools, potential mitigation strategies for addressing the relative increase in fire risk or hazard associated with the green building elements and features have been identified. Fire Safety Challenges of Green Buildings is intended for practitioners as a tool for analyzing building safety issues in green architecture and developing methods for tracking data related to green design elements and their potential hazards. Researchers working in a related field will also find the book valuable.
Fire Tablets For Dummies
by Nancy C. MuirLeverage the power of the bestselling Amazon tablet--the FireThe Fire Tablet is hot--as Amazon's premiere tablet, it has access to a large music and video store, a growing app store, a massive library of e-books, and fast, easy one-click shopping. If you're the proud new owner of the latest version of this popular tablet, this fun and friendly guide fuels the fire by helping you make the most of its myriad features and capabilities.There's a ton of documentation and online support surrounding the Fire, but much of it is lacking--not to mention packed with jargon that could make even a tech-guru's head spin. In Fire Tablets For Dummies, you'll get easy-to-understand, thorough, and plain-English explanations of the features and topics you'll encounter as you cruise around your cool new device.Shows you how to set up your Fire, navigate with the touchscreen, and connect to Wi-FiOffers clear instruction on browsing the web, receiving and sending email, and posting on FacebookCovers new services Amazon has instituted in the latest Fire Tablet modelProvides up-to-date information on the latest and greatest apps available for your Fire tabletWhether you want to play music, watch movies, read e-books, shop online, or download apps from the Amazon Appstore--or anything in between--you'll want to keep Fire Tablets For Dummies close at hand to unlock the limitless potential of your tablet.
Fire Within: An Unofficial Graphic Novel for Minecrafters (The Magic Portal #2)
by Cara J. StevensThe second book in an all-new graphic novel series for Minecrafters—The Magic Portal!Ghasts can be a real pain when you&’re trying to survive an ultimate challenge. In book two of The Magic Portal series, Keri and Omar bravely return to the magic portal to visit the ancient Nether and learn as much as they can about these unusual and dangerous creatures and get the competitive edge they need to survive. While they&’re exploring the mysterious origins of these floating, fire-ball-launching beasts, they discover new limitations in their magic portal&’s capabilities: a timer. When a mysterious figure messes with their plans and blocks their passage home, Keri and Omar must find a way to complete their mission and get past their unseen enemy before the clock runs down. Will they make it? Only time will tell.
Fire in the Valley: The Birth and Death of the Personal Computer
by Michael Swaine Paul FreibergerIn the 1970s, while their contemporaries were protesting the computer as a tool of dehumanization and oppression, a motley collection of college dropouts, hippies, and electronics fanatics were engaged in something much more subversive. Obsessed with the idea of getting computer power into their own hands, they launched from their garages a hobbyist movement that grew into an industry, and ultimately a social and technological revolution. What they did was invent the personal computer: not just a new device, but a watershed in the relationship between man and machine. This is their story.Fire in the Valley is the definitive history of the personal computer, drawn from interviews with the people who made it happen, written by two veteran computer writers who were there from the start. Working at InfoWorld in the early 1980s, Swaine and Freiberger daily rubbed elbows with people like Steve Jobs and Bill Gates when they were creating the personal computer revolution.A rich story of colorful individuals, Fire in the Valley profiles these unlikely revolutionaries and entrepreneurs, such as Ed Roberts of MITS, Lee Felsenstein at Processor Technology, and Jack Tramiel of Commodore, as well as Jobs and Gates in all the innocence of their formative years.This completely revised and expanded third edition brings the story to its completion, chronicling the end of the personal computer revolution and the beginning of the post-PC era. It covers the departure from the stage of major players with the deaths of Steve Jobs and Douglas Engelbart and the retirements of Bill Gates and Steve Ballmer; the shift away from the PC to the cloud and portable devices; and what the end of the PC era means for issues such as personal freedom and power, and open source vs. proprietary software.
FireSigns: A Semiotic Theory for Graphic Design (Design Thinking, Design Theory)
by Steven SkaggsSemiotics concepts from a design perspective, offering the foundation for a coherent theory of graphic design as well as conceptual tools for practicing designers.Graphic design has been an academic discipline since the post-World War II era, but it has yet to develop a coherent theoretical foundation. Instead, it proceeds through styles, genres, and imitation, drawing on sources that range from the Bauhaus to deconstructionism. In FireSigns, Steven Skaggs offers the foundation for a semiotic theory of graphic design, exploring semiotic concepts from design and studio art perspectives and offering useful conceptual tools for practicing designers.Semiotics is the study of signs and significations; graphic design creates visual signs meant to create a certain effect in the mind (a “FireSign”). Skaggs provides a network of explicit concepts and terminology for a practice that has made implicit use of semiotics without knowing it. He offers an overview of the metaphysics of visual perception and the notion of visual entities, and, drawing on the pragmatic semiotics of the philosopher Charles Sanders Peirce, looks at visual experience as a product of the action of signs. He introduces three conceptual tools for analyzing works of graphic design—semantic profiles, the functional matrix, and the visual gamut—that allow visual “personality types” to emerge and enable a greater understanding of the range of possibilities for visual elements. Finally, he applies these tools to specific analyses of typography.
Firebase Cookbook
by Houssem YahiaouiPractical solutions for developing seamless experiences for application that scales. About This Book • A Solution based approach that would help you create high-quality apps for your businesses • Harness the power of real-time database to create apps that work on multiple platforms • Build a customized solution for your app development challenges with Firebase Who This Book Is For This book will assume you have at least a minimum set of skills in JavaScript, HTML and CSS. Also, having some familiarity with backend technologies will be helpful. After all we're going to build a backend application that will change the way backend developer works. What You Will Learn • Use Firebase Diverse Authentication systems • Integrate easy, secure File Hosting using Firebase Storage services • Make your application serverless using Firebase Cloud Functions • Use the powerful Firebase Admin SDK for privilege management • Use Firebase within NativeScript apps for cross-platform applications • Modify, structure, save and serve data in and from Realtime Database • Get acquainted with the newly introduce Cloud Firestore, a scalable database for your web and mobile applications In Detail Do you feel tired just thinking or even hearing about backend technologies, authentication or the tedious task of deployment? Firebase is here to change the way you develop and make your app a first-class citizen of the cloud. This books takes a solution based approach by providing you recipes that would help you understand the features of Firebase and implement them in your existing web or mobile applications. We start-off by creating our first Firebase application and integrating its services into different platforms and environments for mobile as well as web applications. Then we deep dive into Real-time Database and Firebase Storage that allows your users to access data across various devices with realtive ease. With each chapter you will gradually create the building blocks of your application from securing your data with Firebase Rules to authenticating your users with O-Auth. Moving along we would explore modern application development techniques such as creating serverless applications with Firebase Cloud Functions or turning your traditional applications into progressive apps with Service workers. Finally you will learn how to create cross-platform mobile apps, integrate Firebase in native platforms, and learn how to monetize your mobile applications using Admob for Android and iOS. Style and approach This recipe-based practical guide presents each topic with step-by-step instructions on how you can create collaborative and efficient progressive applications using the latest features and capabilities in Firebase.
Firebrand Waves of Digital Activism 1994–2014: The Rise and Spread of Hacktivism and Cyberconflict
by Athina KaratzogianniFirebrand Waves of Digital Activism 1994–2014.
Firebug 1.5: Editing, Debugging, and Monitoring Web Pages
by Chandan Luthra Deepak MittalA step-by-step description of each key feature is provided with the help of simple, easy-to-understand examples. There are plenty of useful screenshots in each chapter. Every chapter contains information as well as tips and tricks to draw your attention towards some useful information or reference. Each aspect of web development like CSS or JavaScript is handled independently so that you can refer to those modules in which you are interested. This book is written for frontend web developers building software and pages using HTML, CSS, JavaScript, and AJAX, who want to learn Firebug for the reasons outlined above. The book assumes that readers have a very basic knowledge of HTML, JavaScript, and CSS. The examples in the book can be understood by someone who has just been introduced to web development.
Firefox For Dummies
by Blake RossFirefox For Dummies gives you the inside scoop on the exciting new browser from the Web wizard that got it started. The book's author, Blake Ross, began developing Firefox as a teenager. Once available to the world, the simple and powerful tool was an instant hit claiming a sizable share of the Web browser market with over 140 million downloads. In this book Blake not only gives you the lowdown on how to use Firefox for safe Web searching, but he also shares his insight into how the product came to life. It's a combination of practical tech insight and a good story that is rare in computer books. Topics covered include downloading and installing Firefox, creating a home page, searching with Google, creating customized themes and toolbars, using tabbed browsing, downloading and saving files, maintaining security and privacy, eliminating annoying popups, and adding Firefox extensions.
Firefox Hacks
by Nigel McfarlaneFirefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience. It's also the first book that specifically dedicates itself to this technology. Firefox is winning such widespread approval for a number of reasons, including the fact that it lets users browse faster and more efficiently. Perhaps its most appealing strength, though, is its increased security something that is covered in great detail in Firefox Hacks . Clearly the web browser of the future, Firefox includes most of the features that browser users are familiar with, along with several new features, such as a bookmarks toolbar and tabbed pages that allow users to quickly switch among several web sites. Firefox Hacks offers all the valuable tips and tools you need to maximize the effectiveness of this hot web application. It's all covered, including how to customize its deployment, appearance, features, and functionality. You'll even learn how to install, use, and alter extensions and plug-ins. Aimed at clever people who may or may not be capable of basic programming tasks, this convenient resource describes 100 techniques for 100 strategies that effectively exploit Firefox. Or, put another way, readers of every stripe will find all the user-friendly tips, tools, and tricks they need to make a productive switch to Firefox. With Firefox Hacks , a superior and safer browsing experience is truly only pages away. The latest in O'Reilly's celebrated Hacks series, Firefox Hacks smartly complements other web-application titles such as Google Hacks and PayPal Hacks .
Firefox Hacks
by Nigel McfarlaneFirefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience. It's also the first book that specifically dedicates itself to this technology. Firefox is winning such widespread approval for a number of reasons, including the fact that it lets users browse faster and more efficiently. Perhaps its most appealing strength, though, is its increased security something that is covered in great detail in Firefox Hacks. Clearly the web browser of the future, Firefox includes most of the features that browser users are familiar with, along with several new features, such as a bookmarks toolbar and tabbed pages that allow users to quickly switch among several web sites. Firefox Hacks offers all the valuable tips and tools you need to maximize the effectiveness of this hot web application. It's all covered, including how to customize its deployment, appearance, features, and functionality. You'll even learn how to install, use, and alter extensions and plug-ins. Aimed at clever people who may or may not be capable of basic programming tasks, this convenient resource describes 100 techniques for 100 strategies that effectively exploit Firefox. Or, put another way, readers of every stripe will find all the user-friendly tips, tools, and tricks they need to make a productive switch to Firefox. With Firefox Hacks, a superior and safer browsing experience is truly only pages away. The latest in O'Reilly's celebrated Hacks series, Firefox Hacks smartly complements other web-application titles such as Google Hacks and PayPal Hacks.
Firefox Secrets
by Cheah Chu YeowThis is a must read guide to anyone who wants to learn how to browse faster and more conveniently with Firefox. Firefox Secrets will teach you how to get the most from Mozilla, including how to find and use all the hidden features, extensions available to you. You'll learn: Ways to ease the transition from Internet Explorer A way to setup multiple "homepages" when you launch your browser Read RSS feeds from within Firefox using a free extension Where to download a new and less obtrusive "Download Manager" The best "must-have" extensions to download as well as the "fun" ones Two different ways to speed up Firefox downloads with prefetcher and pipelining Firefox's secret features for Web Developers And much, much more! Firefox Secrets is the ultimate guide to the Web Browser that major magazines, newspapers and even Microsoft's own "Slate.com" website are recommending as the ultimate replacement to Internet Explorer.
Fireside Lectures on Classic Robotic HPB Surgery: From the Sparkling of Sparks to the Spreading of Prairie Blazes: In Memory of Prof. Ningxin Zhou
by Paolo Dario Anusak Yiengpruksawan R. Matthew Walsh Chenghong Peng Shuxin Wang Ningxin ZhouThis book presents a collection of case reviews on robotic HPB (Hepato-pancreato-biliary) surgeries contributed by distinguished surgical experts and robotics engineers. Each case is accompanied by photographs and discussions to facilitate understanding of the presented projects and techniques. The book not only presents practical robotic HPB surgery techniques, but also offers experts’ reflections and perspectives on the future of robotic surgeries and surgical robotics. Serving as a collection in memory of Prof. Ningxin Zhou, a pioneer of robotic HPB surgery in China, it illustrates the development and success of Prof. Zhou’s study of surgical robotics and his explorations in combining surgery with engineering. The book is a valuable resource for practitioners and researchers in the medical field and engineering alike.
Fireside Politics: Radio and Political Culture in the United States, 1920–1940 (Reconfiguring American Political History)
by Douglas B. CraigAn “impressively researched and useful study” of the golden age of radio and its role in American democracy (Journal of American History).In Fireside Politics, Douglas B. Craig provides the first detailed and complete examination of radio’s changing role in American political culture between 1920 and 1940—the medium’s golden age, when it commanded huge national audiences without competition from television.Craig follows the evolution of radio into a commercialized, networked, and regulated industry, and ultimately into an essential tool for winning political campaigns and shaping American identity in the interwar period. Finally, he draws thoughtful comparisons of the American experience of radio broadcasting and political culture with those of Australia, Britain, and Canada.“The best general study yet published on the development of radio broadcasting during this crucial period when key institutional and social patterns were established.” ?Technology and Culture
Firewall (Orca Soundings)
by Sean RodmanJosh deals with his problems by escaping into his favorite video game, but his virtual refuge is starting to get a little too real. Josh is a gamer. After his parents' divorce and his move from Chicago to a small town where he doesn't know anybody, he copes by staying up way too late playing Killswitch online. Then he discovers a "mod" version of the game that is an exact reproduction of his new town. Strange things start to happen in the game, and they are somehow connected with events in the real world. The epub edition of this title is fully accessible.
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
by Carey ParkerRely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats.Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes:Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina)Updates for iOS 13 and Android 10Updated recommendations on the best apps, products, and servicesMore than 170 tips with complete step-by-step instructions and picturesA preview of Mac OS 11 Big Sur and iOS 14 What You Will LearnCreate killer passwords that you do not have to rememberBrowse the web safely and with confidenceProtect your data and reclaim your privacyShop and bank online with maximum securityDefend against identity theftProtect yourself from viruses and scamsMaximize your smartphone security and privacySafeguard your children onlineBlock online tracking and dangerous adsSend files and messages securely and privatelySet up secure home networkingKeep your smart devices from spying on youStop oversharing on social mediaCreate automated backups of all your devicesLearn how the Internet actually worksAnd more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves—step by step, without judgment, and with as little jargon as possible.
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
by Carey ParkerRely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!