Browse Results

Showing 26,501 through 26,525 of 61,781 results

How AI Works: From Sorcery to Science

by Ronald T. Kneusel

AI isn&’t magic. How AI Works demystifies the explosion of artificial intelligence by explaining—without a single mathematical equation—what happened, when it happened, why it happened, how it happened, and what AI is actually doing "under the hood."Artificial intelligence is everywhere—from self-driving cars, to image generation from text, to the unexpected power of language systems like ChatGPT—yet few people seem to know how it all really works. How AI Works unravels the mysteries of artificial intelligence, without the complex math and unnecessary jargon.You&’ll learn: The relationship between artificial intelligence, machine learning, and deep learningThe history behind AI and why the artificial intelligence revolution is happening nowHow decades of work in symbolic AI failed and opened the door for the emergence of neural networksWhat neural networks are, how they are trained, and why all the wonder of modern AI boils down to a simple, repeated unit that knows how to multiply input numbers to produce an output number.The implications of large language models, like ChatGPT and Bard, on our society—nothing will be the same againAI isn&’t magic. If you&’ve ever wondered how it works, what it can do, or why there&’s so much hype, How AI Works will teach you everything you want to know.

How Algorithms Create and Prevent Fake News: Exploring the Impacts of Social Media, Deepfakes, GPT-3, and More

by Noah Giansiracusa

From deepfakes to GPT-3, deep learning is now powering a new assault on our ability to tell what’s real and what’s not, bringing a whole new algorithmic side to fake news. On the other hand, remarkable methods are being developed to help automate fact-checking and the detection of fake news and doctored media. Success in the modern business world requires you to understand these algorithmic currents, and to recognize the strengths, limits, and impacts of deep learning---especially when it comes to discerning the truth and differentiating fact from fiction. This book tells the stories of this algorithmic battle for the truth and how it impacts individuals and society at large. In doing so, it weaves together the human stories and what’s at stake here, a simplified technical background on how these algorithms work, and an accessible survey of the research literature exploring these various topics. How Algorithms Create and Prevent Fake News is an accessible, broad account of the various ways that data-driven algorithms have been distorting reality and rendering the truth harder to grasp. From news aggregators to Google searches to YouTube recommendations to Facebook news feeds, the way we obtain information today is filtered through the lens of tech giant algorithms. The way data is collected, labelled, and stored has a big impact on the machine learning algorithms that are trained on it, and this is a main source of algorithmic bias ­– which gets amplified in harmful data feedback loops. Don’t be afraid: with this book you’ll see the remedies and technical solutions that are being applied to oppose these harmful trends. There is hope.What You Will LearnThe ways that data labeling and storage impact machine learning and how feedback loops can occurThe history and inner-workings of YouTube’s recommendation algorithmThe state-of-the-art capabilities of AI-powered text generation (GPT-3) and video synthesis/doctoring (deepfakes) and how these technologies have been used so farThe algorithmic tools available to help with automated fact-checking and truth-detectionWho This Book is ForPeople who don’t have a technical background (in data, computers, etc.) but who would like to learn how algorithms impact society; business leaders who want to know the powers and perils of relying on artificial intelligence. A secondary audience is people with a technical background who want to explore the larger social and societal impact of their work.

How Artifacts Afford: The Power and Politics of Everyday Things (Design Thinking, Design Theory)

by Jenny L. Davis

A conceptual update of affordance theory that introduces the mechanisms and conditions framework, providing a vocabulary and critical perspective. Technological affordances mediate between the features of a technology and the outcomes of engagement with that technology. The concept of affordances, which migrated from psychology to design with Donald Norman's influential 1988 book, The Design of Everyday Things, offers a useful analytical tool in technology studies--but, Jenny Davis argues in How Artifacts Afford, it is in need of a conceptual update. Davis provides just such an update, introducing the mechanisms and conditions framework, which offers both a vocabulary and necessary critical perspective for affordance analyses.

How Australia Decides

by Sally Young

In recent years, the Australian media have come under fire for their reporting of politics and election campaigns. Political reporting is said to be too influenced by commercial concerns, too obsessed with gossip and scandal, and too focused on trivia and 'sound bites' at the expense of serious issues. There are accusations of bias, sensationalism, 'lazy' journalism and 'horse-race' reporting that is obsessed with opinion polls. How Australia Decides is the first book to put these allegations to the test. Based on a four-year empirical study, Sally Young reports the results of the only systematic, historical and in-depth analysis of Australian election reporting. This groundbreaking book shows how election reporting has changed over time, and how political news audiences, news production and shifts in political campaigning are influencing media content, Ai with profound implications for Australian democracy.

How Big-Tech Barons Smash Innovation—and How to Strike Back

by Ariel Ezrachi Maurice E. Stucke

Two market experts deconstruct the drivers and inhibitors to innovation in the digital economy, explain how large tech companies can stifle disruption, assess the toll of their technologies on our well-being and democracy, and outline policy changes to take power away from big tech and return it to entrepreneurs.Silicon Valley’s genius combined with limited corporate regulation promised a new age of technological innovation in which entrepreneurs would create companies that would in turn fuel unprecedented job growth. Yet disruptive innovation has stagnated even as the five leading tech giants, which account for approximately 25 percent of the S&P 500’s market capitalization, are expanding to unimaginable scale and power. In How Big-Tech Barons Smash Innovation—and How to Strike Back, Ariel Ezrachi and Maurice E. Stucke explain why this is happening and what we can do to reverse it.While many distrust the Big-Tech Barons, the prevailing belief is that innovation is thriving online. It isn’t. Rather than disruptive innovations that create significant value, we are getting technologies that primarily extract value and reduce well-being. Using vivid examples and relying on their work in the field, the authors explain how the leading tech companies design their sprawling ecosystems to extract more profits (while crushing any entrepreneur that poses a threat). As a result, we get less innovation that benefits us and more innovations that surpass the dreams of yesteryears’ autocracies. The Tech Barons’ technologies, which seek to decode our emotions and thoughts to better manipulate our behavior, are undermining political stability and democracy while fueling tribalism and hate.But it’s not hopeless. The authors reveal that sustained innovation scales with cities not companies, and that we, as a society, should profoundly alter our investment strategy and priorities to certain entrepreneurs (“Tech Pirates”) and cities’ infrastructure.

How COVID-19 is Accelerating the Digital Revolution: Challenges and Opportunities

by G. Suseendran Uttam Ghosh Noor Zaman Jhanjhi R. Anandan Pushpita Chatterjee

This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis. Indeed, as the demand for digital technologies grows, local and regional governments are increasingly committed to improving the lives of their citizens under the principles of privacy, freedom of expression and democracy.The Digital Revolution began between the late 1950s and 1970s and represents the evolution of technology from the mechanical and analog to the digital. The advent of digital technology has also changed how humans communicate – today using computers, smartphones and the internet. Further, the digital revolution has made a tremendous wealth of information accessible to virtually everyone. In turn, the book focuses on key challenges for local and regional governments concerning digital technologies during this crisis, e.g. the balance between privacy and security, the digital divide, and accessibility. Privacy is a challenge in the mitigation of COVID-19, as governments rely on digital technologies like contact-tracking apps and big data to help trace peoples’ patterns and movements. While these methods are controversial and may infringe on rights to privacy, they also appear to be effective measures for rapidly controlling and limiting the spread of the virus. Next, the book discusses the 10 technology trends that can help build a resilient society, as well as their effects on how we do business, how we work, how we produce goods, how we learn, how we seek medical services and how we entertain ourselves. Lastly, the book addresses a range of diversified technologies, e.g. Online Shopping and Robot Deliveries, Digital and Contactless Payments, Remote Work, Distance Learning, Telehealth, Online Entertainment, Supply Chain 4.0, 3D Printing, Robotics and Drones, 5G, and Information and Communications Technology (ICT).

How Colleges Use Data (Higher Ed Leadership Essentials)

by Jonathan S. Gagliardi

What does a culture of evidence really look like in higher education?The use of big data and the rapid acceleration of storage and analytics tools have led to a revolution of data use in higher education. Institutions have moved from relying largely on historical trends and descriptive data to the more widespread adoption of predictive and prescriptive analytics. Despite this rapid evolution of data technology and analytics tools, universities and colleges still face a number of obstacles in their data use. In How Colleges Use Data, Jonathan S. Gagliardi presents college and university leaders with an important resource to help cultivate, implement, and sustain a culture of evidence through the ethical and responsible use and adoption of data and analytics. Gagliardi provides a broad context for data use among colleges, including key concepts and use cases related to data and analytics. He also addresses the different dimensions of data use and highlights the promise and perils of the widespread adoption of data and analytics, in addition to important elements of implementing and scaling a culture of evidence.Demystifying data and analytics, the book helps faculty and administrators understand important topics, including:• How to define institutional aspirations using data• Equity and student success• Strategic finance and resource optimization• Academic quality and integrity• Data governance and utility• Implicit and explicit bias in data• Implementation and planning• How data will be used in the futureHow Colleges Use Data helps college and university leaders understand what a culture of evidence in higher education truly looks like.

How Computers Create Social Structures: Accidental Collectives

by Silvio Carta

This book introduces the idea of accidental collectives: the grouping of people that occurs as a by-product of the automated work of computers. Software has a growing influence in our lives automating and optimising mundane, time-consuming and repetitive tasks. In doing this, groups of people are automatically created as the result of classification and data analysis. Once grouped by the invisible agency of software, people interact and establish new relationships, generating new collectives and communities. With the support of case studies and real-life examples, this work explores the accidental nature of the generation of new social groups and questions the role of software in social interactions.

How Computers Make Books: From graphics rendering, search algorithms, and functional programming to indexing and typesetting

by John Whitington

Learn about computer science by exploring the fascinating journey it took to make this book!How Computers Make Books introduces what&’s wonderful about computer science by showing how computers have transformed the art of publishing books. Author and publishing software developer John Whitington reveals the elegant computer science solutions invented to solve big publishing challenges. In How Computers Make Books you&’ll discover: How human descriptions are translated into computer programs How a computer can understand document formatting How a program decides where to print ink on a page Why computer science is so interesting to computer scientists, and why it might interest you …and much more! How do computers represent all the different languages and letters used by humans? How do we compress a book&’s worth of complex information so it can be transferred in seconds? And what exactly is a computer program? This book answers all those questions by telling the story of how it was created! About the technology Computers are part of every step in creating a book, from capturing the author&’s words as a digital document to controlling how the ink gets onto the paper. How Computers Make Books introduces basic computer science concepts like file formatting, transfer, and storage, computer programming, and task automation by guiding you through the modern digital printing process. About the book This book takes you on a journey from the plain white page, weaving through typesetting, making gray images from black ink, electronic file formats, and more. It makes computer science come alive as you see how every word, illustration, and page has its own story. You&’ll even learn to write your own simple programs and discover hands-on what&’s so intoxicating about computer science. What's inside How human descriptions are translated into computer programs How a digital computer thinks about print documents How a program decides where to print ink on a page How the history of typesetting shows up in modern books About the reader For the curious-but-clueless about computer science—and anyone interested in how computers make books! About the author John Whitington is the founder of a company that builds software for electronic document processing. He has studied and taught Computer Science at Queens&’ College, Cambridge. Technical editor on this book was Bojan Stojanovic. Table of Contents 1 Putting marks on paper 2 Letter forms 3 Storing words 4 Looking and finding 5 Typing it in 6 Saving space 7 The sums behind the screen 8 Gray areas 9 A typeface 10 Words to paragraphs 11 Out into the world

How Computers Really Work: A Hands-On Guide to the Inner Workings of the Machine

by Matthew Justice

An approachable, hands-on guide to understanding how computers work, from low-level circuits to high-level code.How Computers Really Work is a hands-on guide to the computing ecosystem: everything from circuits to memory and clock signals, machine code, programming languages, operating systems, and the internet.But you won't just read about these concepts, you'll test your knowledge with exercises, and practice what you learn with 41 optional hands-on projects. Build digital circuits, craft a guessing game, convert decimal numbers to binary, examine virtual memory usage, run your own web server, and more.Explore concepts like how to:Think like a software engineer as you use data to describe a real world conceptUse Ohm's and Kirchhoff's laws to analyze an electrical circuitThink like a computer as you practice binary addition and execute a program in your mind, step-by-stepThe book's projects will have you translate your learning into action, as you:Learn how to use a multimeter to measure resistance, current, and voltageBuild a half adder to see how logical operations in hardware can be combined to perform useful functionsWrite a program in assembly language, then examine the resulting machine codeLearn to use a debugger, disassemble code, and hack a program to change its behavior without changing the source codeUse a port scanner to see which internet ports your computer has openRun your own server and get a solid crash course on how the web worksAnd since a picture is worth a thousand bytes, chapters are filled with detailed diagrams and illustrations to help clarify technical complexities.Requirements: The projects require a variety of hardware - electronics projects need a breadboard, power supply, and various circuit components; software projects are performed on a Raspberry Pi. Appendix B contains a complete list. Even if you skip the projects, the book's major concepts are clearly presented in the main text.

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

by Sam Grubb

Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.You don&’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them. Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you&’ve gained into cyber-savvy skills that will make you safer at work and at home. You&’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps. You&’ll also learn how to: • Use command-line tools to see information about your computer and network • Analyze email headers to detect phishing attempts • Open potentially malicious documents in a sandbox to safely see what they do • Set up your operating system accounts, firewalls, and router to protect your network • Perform a SQL injection attack by targeting an intentionally vulnerable website • Encrypt and hash your files In addition, you&’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal&’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.

How Data Happened: A History from the Age of Reason to the Age of Algorithms

by Matthew L. Jones Chris Wiggins

“Fascinating.” —Jill Lepore, The New Yorker A sweeping history of data and its technical, political, and ethical impact on our world. From facial recognition—capable of checking people into flights or identifying undocumented residents—to automated decision systems that inform who gets loans and who receives bail, each of us moves through a world determined by data-empowered algorithms. But these technologies didn’t just appear: they are part of a history that goes back centuries, from the census enshrined in the US Constitution to the birth of eugenics in Victorian Britain to the development of Google search. Expanding on the popular course they created at Columbia University, Chris Wiggins and Matthew L. Jones illuminate the ways in which data has long been used as a tool and a weapon in arguing for what is true, as well as a means of rearranging or defending power. They explore how data was created and curated, as well as how new mathematical and computational techniques developed to contend with that data serve to shape people, ideas, society, military operations, and economies. Although technology and mathematics are at its heart, the story of data ultimately concerns an unstable game among states, corporations, and people. How were new technical and scientific capabilities developed; who supported, advanced, or funded these capabilities or transitions; and how did they change who could do what, from what, and to whom? Wiggins and Jones focus on these questions as they trace data’s historical arc, and look to the future. By understanding the trajectory of data—where it has been and where it might yet go—Wiggins and Jones argue that we can understand how to bend it to ends that we collectively choose, with intentionality and purpose.

How Data Science Is Transforming Health Care

by Tim O'Reilly Mike Loukides Julie Steele Colin Hill

<p>In the early days of the 20th century, department store magnate John\nWanamaker famously said, "I know that half of my advertising doesn't\nwork. The problem is that I don't know which half." That remained\nbasically true until Google transformed advertising with AdSense based\non new uses of data and analysis. The same might be said about health\ncare and it's poised to go through a similar transformation as new\ntools, techniques, and data sources come on line. Soon we'll make\npolicy and resource decisions based on much better understanding of\nwhat leads to the best outcomes, and we'll make medical decisions\nbased on a patient's specific biology. The result will be better\nhealth at less cost.<br/><br/>\nThis paper explores how data analysis will help us structure the\nbusiness of health care more effectively around outcomes, and how it\nwill transform the practice of medicine by personalizing for each\nspecific patient.</p>

How Digital Intelligence Drives Business Growth (Management for Professionals)

by Zhizhuan Business Research Institute

This book aims to build a framework for understanding how to achieve new business growth through digital intelligence. It reveals the driving force and commercial logic behind the technology upgrade and transformation for enterprises, analyzes how to improve enterprises' branding, product, distribution channel, marketing, logistics, and organization under the new context, and studies the successful cases in digital intelligence of 6 Chinese enterprises. For business school students, researchers, managers, and practitioners, it is helpful to build an overview and understanding on strategy level as well as practice level.

How Do I Photograph A Sunset?: More than 150 essential photography questions answered

by Chris Gatcum

How do we learn? We learn by asking questions. But what if we don't know what questions we should be asking? Thanks to the digital revolution, photography has never been so popular, and whether you shoot on a phone or a top-spec DSLR or CSC camera, the urge to improve is relentless. In this book, author Chris Gatcum asks the questions that every photographer will have in mind at some point in their image-making journey, and then answers them in a clear, concise, straightforward and inspirational manner. Laid out in intuitive sections, this book tackles the questions that are on every photographer's mind, as well as those that they haven't thought of yet. And with a clear progression through each chapter, from the simple to more complex, the book asks - and answers - questions to satisfy the complete novice as well as the advanced practitioner.

How Do I Photograph A Sunset?: More than 150 essential photography questions answered

by Chris Gatcum

How do we learn? We learn by asking questions. But what if we don't know what questions we should be asking? Thanks to the digital revolution, photography has never been so popular, and whether you shoot on a phone or a top-spec DSLR or CSC camera, the urge to improve is relentless. In this book, author Chris Gatcum asks the questions that every photographer will have in mind at some point in their image-making journey, and then answers them in a clear, concise, straightforward and inspirational manner. Laid out in intuitive sections, this book tackles the questions that are on every photographer's mind, as well as those that they haven't thought of yet. And with a clear progression through each chapter, from the simple to more complex, the book asks - and answers - questions to satisfy the complete novice as well as the advanced practitioner.

How Does It Sound Now?: Legendary Engineers and Vintage Gear

by Gary Gottlieb

How Does It Sound Now? features 32 interviews with top engineers and producers who have contributed to hundreds of millions of albums and CDs throughout their combined careers, including a new interview with Leslie Gaston-Bird for this second edition.Winner of the 2010 Association for Recorded Sound Collections' Award for Excellence in Historical Recorded Sound Research, the second edition of How Does It Sound Now? allows readers to benefit from the collective experience of 32 industry heavyweights, whose interviews provide a comprehensive overview of the changes in methodology and equipment over the last 60 years. The collection focuses on engineers who made the transition through different technologies—analog to digital, wire to tape, and CD to mp3—and explores the methodology they employed when confronted with new and evolving technology. With a wide range of interviewees, from Phil Ramone to Geoff Emerick, discussions are centered around how producers and engineers retain quality and continue to create a product that conforms to their own high standards in the face of changing technologies.The techniques described will be valuable to students of audio history or theory and recording courses, and will also be of interest to audio professionals, including home recordists and studio owners, who can use this book to educate their staff and offer to clients.

How Education Works: Teaching, Technology, and Technique (Issues in Distance Education)

by Jon Dron

In this engaging volume, Jon Dron views education, learning, and teaching through a technological lens that focuses on the parts we play in technologies, from language and pedagogies to computers and regulations. He proposes a new theory of education whereby individuals are not just users but co-participants in technologies— technologies that are intrinsic parts of our cognition, of which we form intrinsic parts, through which we are entangled with one another and the world around us. Dron reframes popular families of educational theory (objectivist, subjectivist, and complexivist) and explains a variety of educational phenomena, including the failure of learning style theories, the nature of literacies, systemic weaknesses in learning management systems, the prevalence of cheating in educational institutions, and the fundamental differences between online and in-person learning. Ultimately, How Education Works articulates how practitioners in education can usefully understand technology, education, and their relationship to improve teaching practice.

How Fuzzy Concepts Contribute to Machine Learning (Studies in Fuzziness and Soft Computing #416)

by Vicenç Torra Mahdi Eftekhari Adel Mehrpooya Farid Saberi-Movahed

This book introduces some contemporary approaches on the application of fuzzy and hesitant fuzzy sets in machine learning tasks such as classification, clustering and dimension reduction. Many situations arise in machine learning algorithms in which applying methods for uncertainty modeling and multi-criteria decision making can lead to a better understanding of algorithms behavior as well as achieving good performances. Specifically, the present book is a collection of novel viewpoints on how fuzzy and hesitant fuzzy concepts can be applied to data uncertainty modeling as well as being used to solve multi-criteria decision making challenges raised in machine learning problems. Using the multi-criteria decision making framework, the book shows how different algorithms, rather than human experts, are employed to determine membership degrees. The book is expected to bring closer the communities of pure mathematicians of fuzzy sets and data scientists.

How Happy to Call Oneself a Turk

by Gavin D. Brockett

The modern nation-state of Turkey was established in 1923, but when and how did its citizens begin to identify themselves as Turks? Mustafa Kemal Ataturk, Turkey's founding president, is almost universally credited with creating a Turkish national identity through his revolutionary program to "secularize" the former heartland of the Ottoman Empire. Yet, despite Turkey's status as the lone secular state in the Muslim Middle East, religion remains a powerful force in Turkish society, and the country today is governed by a democratically elected political party with a distinctly religious (Islamist) orientation. In this history, Gavin D. Brockett takes a fresh look at the formation of Turkish national identity, focusing on the relationship between Islam and nationalism and the process through which a "religious national identity" emerged. Challenging the orthodoxy that Ataturk and the political elite imposed a sense of national identity from the top down, Brockett examines the social and political debates in provincial newspapers from around the country. He shows that the unprecedented expansion of print media in Turkey between 1945 and 1954, which followed the end of strict, single-party authoritarian government, created a forum in which ordinary people could inject popular religious identities into the new Turkish nationalism. Brockett makes a convincing case that it was this fruitful negotiation between secular nationalism and Islam--rather than the imposition of secularism alone--that created the modern Turkish national identity.

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

by John J. Trinckes, Jr.

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical ‘FICO’ score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.

How Humans Judge Machines

by Cesar A. Hidalgo Diana Orghiain Jordi Albo Canals Filipa De Almeida Natalia Martin

How people judge humans and machines differently, in scenarios involving natural disasters, labor displacement, policing, privacy, algorithmic bias, and more.How would you feel about losing your job to a machine? How about a tsunami alert system that fails? Would you react differently to acts of discrimination depending on whether they were carried out by a machine or by a human? What about public surveillance? How Humans Judge Machines compares people's reactions to actions performed by humans and machines. Using data collected in dozens of experiments, this book reveals the biases that permeate human-machine interactions. Are there conditions in which we judge machines unfairly? Is our judgment of machines affected by the moral dimensions of a scenario? Is our judgment of machine correlated with demographic factors such as education or gender? César Hidalgo and colleagues use hard science to take on these pressing technological questions. Using randomized experiments, they create revealing counterfactuals and build statistical models to explain how people judge artificial intelligence and whether they do it fairly. Through original research, How Humans Judge Machines bring us one step closer tounderstanding the ethical consequences of AI.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code: And Other Stories Of Intelligence And Codes

by David Kahn

This book recounts the desperate efforts to gather information during World War II and the Cold War. The author provides insight into the dark realm of intelligence and code that will fascinate cryptographers, intelligence personnel, and the millions of people interested in military history, espionage adventure, and world affairs. David Kahn is universally regarded as the dean of intelligence historians. Authoritative and addictively readable, this book, by revealing the past, helps guide present and future intelligence efforts.

How I Made My First Million on the Internet and How You Can Too!: The Complete Insider's Guide to Making Millions with Your Internet Business

by Ewen Chia

A comprehensive step-by-step guide to setting up a booming Internet business! Successful entrepreneur Ewen Chia demystifies marketing jargon and shares the tips and techniques that continue to net his online businesses a cool fortune. Whether you&’re seeking to create and develop a thriving Internet business from scratch or looking to realize the full potential of your existing business, whether you haven&’t a clue what the Internet is about or you&’re armed with a business degree, Ewen&’s upbeat and accessibly written Million-Dollar Blueprint will help you: * Find out who&’s buying what and develop lucrative solutions to meet market needs * Grab and keep the attention of prospective buyers with irresistible offers * Create a follow-up system of additional offers to boost income and grow your business * Automate your business so you can enjoy the ultimate rewards of profits, time, and leisure * Duplicate your business(es) to multiply your total income

How I Rob Banks: And Other Such Places

by FC

Follow FC as he steals from the world’s most secure banks and government facilities—without breaking a single law In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to “steal” money, data, and anything else he can get his hands on. In the book, you’ll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes. The author explains how banks and other secure facilities operate, both digitally and physically, and shows you the tools and techniques he uses to gain access to some of the world’s most locked-down buildings. You’ll also find: Strategies you can implement immediately to better secure your own company, home, and data against malicious actors Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained inside An inside and candid look at a rarely examined industry through the eyes of one of its most respected penetration testers A can’t-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean’s 11-style story pulled straight from the real world.

Refine Search

Showing 26,501 through 26,525 of 61,781 results