- Table View
- List View
Identity and Digital Communication: Concepts, Theories, Practices
by Rob CoverThis comprehensive text explores the relationship between identity, subjectivity and digital communication, providing a strong starting point for understanding how fast-changing communication technologies, platforms, applications and practices have an impact on how we perceive ourselves, others, relationships and bodies. Drawing on critical studies of identity, behaviour and representation, Identity and Digital Communication demonstrates how identity is shaped and understood in the context of significant and ongoing shifts in online communication. Chapters cover a range of topics including advances in social networking, the development of deepfake videos, intimacies of everyday communication, the emergence of cultures based on algorithms, the authenticities of TikTok and online communication’s setting as a site for hostility and hate speech. Throughout the text, author Rob Cover shows how the formation and curation of self-identity is increasingly performed and engaged with through digital cultural practices, affirming that these practices must be understood if we are to make sense of identity in the 2020s and beyond. Featuring critical accounts, everyday examples and analysis of key platforms such as TikTok, this textbook is an essential primer for scholars and students in media studies, psychology, cultural studies, sociology, anthropology, computer science, as well as health practitioners, mental health advocates and community members.
Identity and Play in Interactive Digital Media: Ergodic Ontogeny (Routledge Advances in Game Studies)
by Sara M. ColeRecent shifts in new literacy studies have expanded definitions of text, reading/viewing, and literacy itself. The inclusion of non-traditional media forms is essential, as texts beyond written words, images, or movement across a screen are becoming ever more prominent in media studies. Included in such non-print texts are interactive media forms like computer or video games that can be understood in similar, though distinct, terms as texts that are read by their users. This book examines how people are socially, culturally, and personally changing as a result of their reading of, or interaction with, these texts. This work explores the concept of ergodic ontogeny: the mental development resulting from interactive digital media play experiences causing change in personal identity.
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
by Morey J. Haber Darran RollsDiscover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vectorImplement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory complianceSee where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards to integrate key identity management technologies into a corporate ecosystemPlan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition
by Morey J. Haber Darran RollsToday, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric. What You Will Learn Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments
Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
by Steve Martinelli Henry Nash Brad TopolKeystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features—support for federated identity
Identity, Institutions and Governance in an AI World: Transhuman Relations
by Peter BloomThe 21st century is on the verge of a possible total economic and political revolution. Technological advances in robotics, computing and digital communications have the potential to completely transform how people live and work. Even more radically, humans will soon be interacting with artificial intelligence (A.I.) as a normal and essential part of their daily existence. What is needed now more than ever is to rethink social relations to meet the challenges of this soon-to-arrive "smart" world. This book proposes an original theory of trans-human relations for this coming future. Drawing on insights from organisational studies, critical theory, psychology and futurism - it will chart for readers the coming changes to identity, institutions and governance in a world populated by intelligent human and non-human actors alike. It will be characterised by a fresh emphasis on infusing programming with values of social justice, protecting the rights and views of all forms of "consciousness" and creating the structures and practices necessary for encouraging a culture of "mutual intelligent design". To do so means moving beyond our anthropocentric worldview of today and expanding our assumptions about the state of tomorrow's politics, institutions, laws and even everyday existence. Critically such a profound shift demands transcending humanist paradigms of a world created for and by humans and instead opening ourselves to a new reality where non-human intelligence and cyborgs are increasingly central.
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
by Lisa BockIdentity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone involved in selecting, purchasing, integrating, or securing a biometric system. This book will help you understand how to select the right biometric system for your organization and walk you through the steps for implementing identity management and authentication. A basic understanding of biometric authentication techniques, such as fingerprint and facial recognition, and the importance of providing a secure method of authenticating an individual will help you make the most of the book.
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust
by Ev Kontsevoy Sakshyam Shah Peter ConradTraditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity.With this book, you'll learn:The four pillars of access: connectivity, authentication, authorization, and auditWhy every attack follows the same pattern, and how to make this threat impossibleHow to implement identity-based access across your entire infrastructure with digital certificatesWhy it's time for secret-based credentials to go awayHow to securely connect to remote resources including servers, databases, K8s Pods, and internal applications such as Jenkins and GitLabAuthentication and authorization methods for gaining access to and permission for using protected resources
Identity, Pedagogy and Technology-enhanced Learning: Supporting the Processes of Becoming a Tradesperson (Professional and Practice-based Learning #27)
by Selena ChanThis book gathers work from over a decade of study, and seeks to better understand and support how learners become tradespeople. The research programme applies recent concepts from neuroscience, educational psychology and technology-enhanced learning to explain and help overcome the challenges of learning in trades-learning contexts. Due to the complex and multifarious nature of the work characterising trade occupations, learning how to become a tradesperson requires a significant commitment in terms of time, along with physical and cognitive effort. All modalities (visual, aural, haptic etc.) and literacies (text, numerical, spatial etc.) are required when undertaking trade work. Manual dexterity and strength, coupled with the technical and tacit knowledge required for complex problem solving, not to mention suitable dispositional approaches, must all be learnt and focused on becoming a tradesperson.However, there is a substantial gap in the literature on 'how people learn a trade' and 'how to teach a trade'. In this book, contemporary teaching and learning approaches and strategies, as derived through practice-based participatory research, are used to highlight and discuss pragmatic solutions to facilitate the learning and teaching of trade skills, knowledge and dispositions. The approaches and strategies discussed include the implementation of technology-enhanced learning; project-based inquiry/problem-based learning; and recommendations to ensure learners are prepared for the future of work.
Identity Technologies
by Anna Poletti Julie Rak"Identity Technologies "is a substantial contribution to the fields of autobiography studies, digital studies, and new media studies, exploring the many new modes of self-expression and self-fashioning that have arisen in conjunction with Web 2. 0, social networking, and the increasing saturation of wireless communication devices in everyday life. This volume explores the various ways that individuals construct their identities on the Internet and offers historical perspectives on ways that technologies intersect with identity creation. Bringing together scholarship about the construction of the self by new and established authors from the fields of digital media and auto/biography studies, "Identity Technologies "presents new case studies and fresh theoretical questions emphasizing the methodological challenges inherent in scholarly attempts to account for and analyze the rise of identity technologies. The collection also includes an interview with Lauren Berlant on her use of blogs as research and writing tools.
Identity Theft and Fraud: Evaluating and Managing Risk (Critical Issues in Risk Management)
by Norm Archer Susan Sproule Yufei Yuan Ken Guo Junlian XiangPersonal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a risk management approach. It outlines various strategies that can be easily implemented to help prevent identity theft and fraud. It addresses technical issues in a clear and uncomplicated way to help decision-makers at all levels understand the steps their businesses and organizations can take to mitigate identity theft and fraud risks. And it highlights the risks individuals face in this digital age. This book can help anyone – businesses and organizations of all sizes, as well as individuals – develop an identity theft and fraud prevention strategy that will reduce their risk and protect their identity assets. To date, little has been written on identity theft and fraud with a Canadian audience in mind. This book fills that gap, helping Canadians minimize their identity theft and fraud risks.
Identity Theft For Dummies
by Michael J. Arata Jr.Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9. 9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim. Written by a veteran security professional, Identity Theft For Dummies gives you the tools to recognize what information is vulnerable, minimize your risk, stay safe online, and practice damage control if your identity is compromised. If you have a name, a date of birth, and a Social Security number, you're a potential victim; this book helps you recognize your risk and defend against identity thieves Explains what identity theft is, how it happens, and how to recognize if you have become a victim Shows how to protect your personal information, how to be discreet in public places, how to interpret your credit report, and why you should monitor your financial statements Helps you recognize risks you may not have considered, such as what you set at the curb on trash day Provides advice on how to clear your name if you are victimized Identity Theft For Dummies arms you to fight back against this growing threat.
The Identity Theft Protection Guide
by Amanda WelshPROTECTION PREVENTION REPAIRIdentity theft is the fastest-growing category of crime in the United States today, and dealing with privacy and identity issues has become an essential part of life in our modern society. Each chapter in The Identity Theft Protection Guide contains a self-quiz to identify personal areas of concern, information to help you "take action," and more. This book shows you how to:* Minimize the risk of identity theft* React if your identity is stolen* Obtain and repair credit and insurance reports, and more* Deal with direct marketers, junk mailers, and telephone solicitors* Stop surveillance from GPS devices and cell-phone cameras* Keep your kids safe online* And much more!These valuable survival skills can no longer be considered optional--they are essential for life in today's society. Amanda Welsh's The Identity Theft Protection Guide is the most complete, authoritative, and easy-to-use resource on this crucial topic.
The Identity Trade: Selling Privacy and Reputation Online (Critical Cultural Communication #7)
by null Nora A. DraperThe successes and failures of an industry that claims to protect and promote our online identitiesWhat does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity—a form of cultural currency.The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service.Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age.Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.
Identity with Windows Server 2016: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016
by Vladimir Stefanovic Sasha KranjacEquip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam. Key Features Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742 Acquire skills to reduce IT costs and deliver more business value Enhance your existing skills through practice questions and mock tests Book Description MCSA: Windows Server 2016 certification is one of the most sought-after certifications for IT professionals, which includes working with Windows Server and performing administrative tasks around it. This book is aimed at the 70-742 certification and is part of Packt's three-book series on MCSA Windows Server 2016 certification, which covers Exam 70-740, Exam 70-741, and Exam 70-742. This exam guide covers the exam objectives for the 70-742 Identity with Windows Server 2016 exam. It starts with installing and configuring Active Directory Domain Services (AD DS), managing and maintaining AD DS objects and advanced configurations, configuring Group Policy, Active Directory Certificate Services, and Active Directory Federation Services and Rights Management. At the end of each chapter, convenient test questions will help you in preparing for the certification in a practical manner. By the end of this book, you will be able to develop the knowledge and skills needed to complete MCSA Exam 70-742: Identity with Windows Server 2016 with confidence. What you will learn Install, configure, and maintain Active Directory Domain Services (AD DS) Manage Active Directory Domain Services objects Configure and manage Active Directory Certificate Services Configure and manage Group Policy Design, implement, and configure Active Directory Federation Services Implement and configure Active Directory Rights Management Services Who this book is for This book primarily targets system administrators who are looking to gain knowledge about identity and access technologies with Windows Server 2016 and aiming to pass the 70-742 certification. This will also help infrastructure administrators who are looking to gain advanced knowledge and understanding of identity and access technologies with Windows Server 2016. Familiarity with the concepts such as Active Directory, DNS is assumed.
Idiomatic Rust: Code like a Rustacean
by Brenden MatthewsTips, tricks, design patterns, and secret features of Rust that will help you build stable and maintainable applications.Whether you&’re a Rust beginner or a pro, Idiomatic Rust will teach you to be a better Rust programmer. It introduces essential design patterns for Rust software with detailed explanations, and code samples that encourage you to get stuck in. In Idiomatic Rust you&’ll learn how to apply important design patterns including: • Fluent interfaces for creating delightful APIs • The Builder pattern to encapsulate data and perform initialization • Immutable data structures that help you avoid hard-to-debug data race conditions • Functional programming patterns • Anti-patterns and what not to do in Rust Idiomatic Rust catalogs, documents, and describes both how classic design patterns work with Rust, and the new Rust-specific patterns that will help you master the language. Each pattern or best practice helps solve common programming problems and ensure your code is easy for others to understand. You&’ll learn when to use each pattern—and when to break it! You&’ll soon be producing higher-quality Rust code and higher-quality Rust software. About the technology After you&’re comfortable with Rust&’s syntax and its uniquely-powerful compiler, there&’s a whole new dimension to explore as you put it to use in real projects. How do you apply standard design patterns in Rust applications? Where and why should you use IntoIterator? Why do Rustaceans love the PhantomData type? This book answers these questions and many, many more. About the book Idiomatic Rust introduces the coding and design patterns you&’ll need to take advantage of Rust&’s unique language design. This book&’s clear explanations and reusable code examples help you explore metaprogramming, build your own libraries, create fluent interfaces, and more. Along the way, you&’ll learn how to write efficient, idiomatic Rust code that&’s easy to maintain and evolve as you learn how the language works under the hood. What's inside • Creating delightful APIs • Applying Builder and other classic design patterns • Functional programming patterns • Rust anti-patterns About the reader For intermediate Rust programmers. About the author Brenden Matthews is a member of the Apache Software Foundation, creator of the system monitor Conky, and author of Code Like a Pro in Rust. The technical editor on this book was Alain M Couniot. Table of Contents PART 1 1 Rust-y patterns 2 Rust&’s basic building blocks 3 Code flow PART 2 4 Introductory patterns 5 Design patterns: Beyond the basics 6 Designing a library PART 3 7 Using traits, generics, and structs for specialized tasks 8 State machines, coroutines, macros, and preludes PART 4 9 Immutability 10 Antipatterns A Installing Rust
Idiot: Life Stories from the Creator of Help Helen Smash
by Laura CleryFrom YouTube star and Facebook Video sensation Laura Clery comes a collection of comedic essays in the vein of We Are Never Meeting in Real Life by Samantha Irby and You’ll Grow Out of It by Jessi Klein.Laura Clery makes a living by sharing inappropriate comedy sketches with millions of strangers on the Internet. She writes songs about her anatomy, talks trash about her one-eyed rescue pug, and sexually harasses her husband, Stephen. And it pays the bills! Now, in her first-ever book, Laura recounts how she went from being a dangerously impulsive, broke, unemployable, suicidal, cocaine-addicted narcissist, crippled by fear and hopping from one toxic romance to the next…to a more-happy-than-not, somewhat rational, meditating, vegan yogi with good credit, a great marriage, a fantastic career, and four unfortunate-looking rescue animals. Still, above all, Laura remains an amazingly talented, adorable, and vulnerable, self-described…Idiot. With her signature brand of offbeat, no-holds-barred humor, Idiot introduces you to a wildly original—and undeniably relatable—new voice.
Idiots: Marriage, Motherhood, Milk & Mistakes
by Laura CleryA fresh, hilarious, and relatable collection of essays about everything from motherhood and marriage to sobriety and work-life balance (or imbalance) from the nationally bestselling author of the &“honest, complicated&” (SheKnows) Idiot.TRIGGER WARNING: TORN EVERYTHING! In her first book, Idiot, bestselling author Laura Clery gave us mind-blowingly personal life stories about addiction, toxic relationships, and recovery—establishing herself as the preeminent voice of infinite conviction meets zero impulse control. Here she is two kids later asking, &“How did we get here?&” Sex. Sex is how we got here. Laura&’s life has changed a great deal since she wrote Idiot, but her hilarious candor has only increased with motherhood—plus she tells some of the stories she was too scared to tell in her first book (which is really saying something). In Idiots, Laura shares more than anyone ever asked for about: -Mucus plugs, vacuum extraction, and adult diapers -Dousing doulas, VagTime, and pelvic organ prolapse -Vaginismus, laxative overdose, and accidental lactivism -Placenta pills, mom brain, and vibrator manifestation -Nipple-twisting orgies and flinging a butt burrito in your doctor&’s face -ADHD, autism, postpartum depression, and the wisdom of a ninety-eight-year-old sage named Anne -Unsolicited dick, sexual assault, and sister-drugging -Stephen&’s cheating, Laura&’s cheating, fights, and forgiveness -Choosing love over fear and healing the world Laura does not hold back when it comes to sharing stories of screw-ups, triumphs, and learning from her mistakes. Whether she&’s crying into a diaper in a Whole Foods parking lot or desperately soliciting advice from a random elderly stranger (who has most certainly considered a restraining order), Laura is able to laugh at herself even during her worst moments—more important, she makes us laugh, cry, and feel less alone in the world.
IE&EM 2019: Proceedings of the 25th International Conference on Industrial Engineering and Engineering Management 2019
by Chen-Fu Chien Ershi Qi Runliang DouThis book records the new research findings and development in the field of industrial engineering and engineering management, and it will serve as the guidebook for the potential development in future. It gathers the accepted papers from the 25th International conference on Industrial Engineering and Engineering Management held at Anhui University of Technology in Maanshan during August 24-25, 2019. The aim of this conference was to provide a high-level international forum for experts, scholars and entrepreneurs at home and abroad to present the recent advances, new techniques and application, to promote discussion and interaction among academics, researchers and professionals to promote the developments and applications of the related theories and technologies in universities and enterprises, and to establish business or research relations to find global partners for future collaboration in the field of Industrial Engineering. It addresses diverse themes in smart manufacturing, artificial intelligence, ergonomics, simulation and modeling, quality and reliability, logistics engineering, data mining and other related fields. This timely book summarizes and promotes the latest achievements in the field of industrial engineering and related fields over the past year, proposing prospects and vision for the further development.
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
by Petr Jurčík Ricardo Severino Stefano Tennina Roberta Daidone Gianluca Dini Nuno Pereira Marco Tiloca Mélanie Bouroche Anis Koubâa Jan-Hinrich Hauer Mário Alves Eduardo TovarThis book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.
IEEE Technology and Engineering Management Society Body of Knowledge (IEEE Press Series on Technology Management, Innovation, and Leadership)
by Gustavo Giannattasio Elif Kongar Marina Dabić Celia Desmond Michael Condry Sudeendra Koushik Roberto SaraccoIEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) IEEE TEMS Board of Directors-approved body of knowledge dedicated to technology and engineering management The IEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) establishes a set of common practices for technology and engineering management, acts as a reference for entrepreneurs, establishes a basis for future official certifications, and summarizes the literature on the management field in order to publish reference documentation for new initiatives. The editors have used a template approach with authors that instructed them on how to introduce their manuscript, how to organize the technology and area fundamentals, the managing approach, techniques and benefits, realistic examples that show the application of concepts, recommended best use (focusing on how to identify the most adequate approach to typical cases), with a summary and conclusion of each section, plus a list of references for further study. The book is structured according to the following area knowledge chapters: business analysis, technology adoption, innovation, entrepreneurship, project management, digital disruption, digital transformation of industry, data science and management, and ethics and legal issues. Specific topics covered include: Market requirement analysis, business analysis for governance planning, financial analysis, evaluation and control, and risk analysis of market opportunities Leading and managing working groups, optimizing group creation and evolution, enterprise agile governance, and leading agile organizations and working groups Marketing plans for new products and services, risk analysis and challenges for entrepreneurs, and procurement and collaboration Projects, portfolios and programs, economic constraints and roles, integration management and control of change, and project plan structure The IEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) will appeal to engineers, graduates, and professionals who wish to prepare for challenges in initiatives using new technologies, as well as managers who are responsible for conducting business involving technology and engineering.
If Hemingway Wrote JavaScript
by Angus CrollWhat if William Shakespeare were asked to generate the Fibonacci series or Jane Austen had to write a factorial program? In If Hemingway Wrote JavaScript, author Angus Croll imagines short JavaScript programs as written by famous wordsmiths. The result is a peculiar and charming combination of prose, poetry, and programming.The best authors are those who obsess about language—and the same goes for JavaScript developers. To master either craft, you must experiment with language to develop your own style, your own idioms, and your own expressions. To that end, If Hemingway Wrote JavaScript playfully bridges the worlds of programming and literature for the literary geek in all of us.Featuring original artwork by Miran Lipova?a.
If It's Smart, It's Vulnerable
by Mikko HypponenReimagine the future of the internet All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we&’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It&’s Smart, It&’s Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It&’s Smart, It&’s Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.
If Then: How One Data Company Invented the Future
by Jill LeporeRadio 4's Book of the WeekA Financial Times Book of the YearShortlisted for the 2020 Financial Times / McKinsey Business Book of the YearLonglisted for the National Book Award 'The story of the original data science hucksters of the 1960s is hilarious, scathing and sobering - what you might get if you crossed Mad Men with Theranos' David RuncimanThe Simulmatics Corporation, founded in 1959, mined data, targeted voters, accelerated news, manipulated consumers, destabilized politics, and disordered knowledge--decades before Facebook, Google, Amazon, and Cambridge Analytica. Silicon Valley likes to imagine it has no past but the scientists of Simulmatics are the long-dead grandfathers of Mark Zuckerberg and Elon Musk. Borrowing from psychological warfare, they used computers to predict and direct human behavior, deploying their "People Machine" from New York, Cambridge, and Saigon for clients that included John Kennedy's presidential campaign, the New York Times, Young & Rubicam, and, during the Vietnam War, the Department of Defence. In If Then, distinguished Harvard historian and New Yorker staff writer, Jill Lepore, unearths from the archives the almost unbelievable story of this long-vanished corporation, and of the women hidden behind it. In the 1950s and 1960s, Lepore argues, Simulmatics invented the future by building the machine in which the world now finds itself trapped and tormented, algorithm by algorithm.'A person can't help but feel inspired by the riveting intelligence and joyful curiosity of Jill Lepore. Knowing that there is a mind like hers in the world is a hope-inducing thing' George Saunders, Man Booker Prize-winning author of Lincoln in the Bardo'An authoritative account of the origins of data science, a compelling political narrative of America in the Sixties, a poignant collective biography of a generation of flawed men' David Kynaston'If Then is simultaneously gripping and absolutely terrifying' Amanda Foreman
If Then: How One Data Company Invented the Future
by Jill LeporeRadio 4's Book of the WeekA Financial Times Book of the YearShortlisted for the 2020 Financial Times / McKinsey Business Book of the YearLonglisted for the National Book Award 'The story of the original data science hucksters of the 1960s is hilarious, scathing and sobering - what you might get if you crossed Mad Men with Theranos' David RuncimanThe Simulmatics Corporation, founded in 1959, mined data, targeted voters, accelerated news, manipulated consumers, destabilized politics, and disordered knowledge--decades before Facebook, Google, Amazon, and Cambridge Analytica. Silicon Valley likes to imagine it has no past but the scientists of Simulmatics are the long-dead grandfathers of Mark Zuckerberg and Elon Musk. Borrowing from psychological warfare, they used computers to predict and direct human behavior, deploying their "People Machine" from New York, Cambridge, and Saigon for clients that included John Kennedy's presidential campaign, the New York Times, Young & Rubicam, and, during the Vietnam War, the Department of Defence. In If Then, distinguished Harvard historian and New Yorker staff writer, Jill Lepore, unearths from the archives the almost unbelievable story of this long-vanished corporation, and of the women hidden behind it. In the 1950s and 1960s, Lepore argues, Simulmatics invented the future by building the machine in which the world now finds itself trapped and tormented, algorithm by algorithm.'A person can't help but feel inspired by the riveting intelligence and joyful curiosity of Jill Lepore. Knowing that there is a mind like hers in the world is a hope-inducing thing' George Saunders, Man Booker Prize-winning author of Lincoln in the Bardo'An authoritative account of the origins of data science, a compelling political narrative of America in the Sixties, a poignant collective biography of a generation of flawed men' David Kynaston'If Then is simultaneously gripping and absolutely terrifying' Amanda Foreman