- Table View
- List View
Official: Guide to the CISSP CBK ((ISC)2 Press)
by Adam Gordon<p>As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. <p>Refreshed technical content has been added to the official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.</p>
The Official (ISC)2 CCSP CBK Reference
by Leslie Fife Aaron Kraus Bryan LewisThe only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture, and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk, and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide: Covers the six CCSP domains and over 150 detailed objectives Provides guidance on real-world best practices and techniques Includes illustrated examples, tables, diagrams and sample questions The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.
The Official (ISC)2 CCSP CBK Reference
by Aaron KrausThe only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide: Covers the six CCSP domains and over 150 detailed objectives Provides guidance on real-world best practices and techniques Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.
The Official (ISC)2 CISSP CBK Reference
by Arthur J. Deane Aaron KrausThe only official, comprehensive reference guide to the CISSP Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
The Official (ISC)2 Guide to the CCSP CBK
by GordonGlobally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The" Official (ISC)2(R) Guide to the CCSPSM CBK(R) "is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. Sample questions help you reinforce what you have learned and prepare smarter. Easy-to-follow content guides you through - Major topics and subtopics within the 6 domains- Detailed description of exam format- Exam registration and administration policiesReviewed by cloud security experts, and developed by (ISC)2, this is your study guide to fully preparing for the CCSP and reaffirming your unique cloud security skills. Get ready for the next step in your career with "Official (ISC)2 Guide to the CCSP CBK". " "
The Official (ISC)2 Guide to the CCSP CBK
by Adam GordonGlobally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter. Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.
The Official (ISC)2 Guide to the CISSP CBK Reference
by John WarsinskeThe only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: • Common and good practices for each objective • Common vocabulary and definitions • References to widely accepted computing standards • Highlights of successful approaches through case studies Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®
by Susan HanscheThe Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certifica
The Official (ISC)2 SSCP CBK Reference
by Mike WillsThe only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification—fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements—is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Access Controls; Security Operations and Administration; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.
The Official (ISC)2 SSCP CBK Reference
by Mike WillsThe only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated 2021 SSCP Exam Outline. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification—fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements—is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Security Operations and Administration; Access Controls; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2 guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.
The Official Scratch Jr. Book: Help Your Kids Learn to Code
by Marina Umaschi Bers Mitchel ResnickScratchJr is a free, introductory computer programming language that runs on iPads, Android tablets, Amazon tablets, and Chromebooks. Inspired by Scratch, the wildly popular programming language used by millions of children worldwide, ScratchJr helps even younger kids create their own playful animations, interactive stories, and dynamic games.The Official ScratchJr Book is the perfect companion to this free app and makes coding easy and fun for all. Kids learn to program by connecting blocks of code to make characters move, jump, dance, and sing.Each chapter includes several activities that build on one another, culminating in a fun final project. These hands-on activities help kids develop computational-thinking, problem-solving, and design skills. In each activity, you’ll find:–Step-by-step, easy-to-follow directions–Ways to connect the activity with literacy and math concepts–Tips for grown-ups and teachers–Creative challenges to take the learning furtherBy the end of the book, kids will be ready for all sorts of new programming adventures!The ScratchJr app now supports English, Spanish, Catalan, Dutch, French, Italian, and Thai.
The Official Stardew Valley Cookbook
by ConcernedApe Ryan NovakNEW YORK TIMES BESTSELLER • The first official cookbook from the immensely popular Stardew Valley, featuring more than 50 delightful recipes straight out of the video game.&“Hungry? Thirsty? I&’ve got just the thing!&”—Gus Welcome to Stardew Valley, where each season brings a new crop of bountiful food to make for friends and family. From farm staples like veggies, fruit, milk, and eggs to foraged mushrooms and berries to fresh fish, there&’s always something delicious to put on the table. These 50 recipes are based on in-game meals and food, allowing you to cook and eat all your home-grown and fresh-caught ingredients in real life. The Official Stardew Valley Cookbook is organized by season and has recipes from your favorite characters, including the Queen of Sauce and Gus at the Stardrop Saloon. Written in collaboration with independent game creator ConcernedApe and packed with original illustrations and food photography, The Official Stardew Valley Cookbook helps you bring the Valley&’s incredible flavors to the dinner table, giving you the energy to take on the world.
Offline
by Donna CoonerIn this e-book original, acclaimed author Donna Cooner spins a timely and gripping story of how we live our lives on -- and off -- social media.Annie Webb is constantly online. She loves following influencer accounts, DM'ing with her two best friends, Luna and Caitlin, and posting selfies with her adorable boyfriend, Jameson.Then Jameson breaks up with Annie -- online. The public humiliation is immediate and intense, and Annie is overwhelmed by the cruel comments that pour in. To help Annie cope, Luna and Caitlin make a plan: the three of them will stay off social media for a month. No posting. No scrolling. No cheating.But unplugging is much harder than they thought. And when the rest of their school finds out about their offline challenge, can the three girls keep their vow -- and their friendship?
Offline!: Der Kollaps der globalen digitalen Zivilisation
by Thomas GrüterIn der Geschichte der Menschheit entstanden und vergingen mehr als 50 Hochkulturen und Zivilisationen. Auffällig dabei: Die meisten zerfielen in nur wenigen Jahrzehnten – unmittelbar nach dem Gipfelpunkt ihrer Macht und ihres Reichtums. Kann uns das auch passieren?Heute, zu Beginn des 21. Jahrhunderts, dominiert nur eine einzige Lebensweise: die globale digitale Zivilisation. Ohne Smartphones, Computer, GPS und Suchmaschinen geht nichts mehr. Nirgendwo. Und noch immer ist der Fortschritt rasant. Hat unsere Zivilisation vielleicht schon bald ihren Höhepunkt erreicht? Das Buch trägt beunruhigende Indizien dafür zusammen – und trifft damit den Nerv der Zeit. In Europa glaubt schon heute eine Mehrheit der Menschen, dass es ihren Kindern schlechter gehen wird als ihnen.Thomas Grüter vertritt die These, dass nicht Pandemien, Supervulkane oder Sonnenstürme die größten Risiken der Menschheit sind. Vielmehr droht das komplexe Grundgerüst unsere Zivilisation seine Stabilität zu verlieren. Selbst ohne die Belastung durch Klimawandel und Bodendegradation könnte es von innen her zerfallen. In zehn Kapiteln untersucht das Buch die Risiken der modernen Informationsgesellschaft, z.B:· Wie anfällig sind die Infrastrukturen und speziell die digitale Infrastruktur?· Wie stabil ist das gespeicherte Wissen? Können medizinische und naturwissenschaftliche Erkenntnisse überhaupt wieder verloren gehen?· Muss eine Wirtschaft, die auf ständiges Wachstum und globalen Handel angewiesen ist, irgendwann kollabieren? · Wann gehen uns die Rohstoffe aus, und ist das überhaupt absehbar? · Wie sicher sind Zukunftsvorsagen?· Welche Gefahr geht von Cyberkriegen aus? · Wie könnte die Gesellschaft nach dem Ende des Internets und der Smartphones aussehen?· Was lernen wir aus dem Zerfall früherer Zivilisationen?· Mit welchen Maßnahmen können wir einen plötzlichen Zerfall der digitalen Lebensweise abfedern oder vermeiden? Spannend geschrieben und umfassend recherchiert, gibt das Buch schlüssige Antworten auf die entscheidende Frage: Wie vermeiden wir die Fehler, an denen bisher alle Zivilisationen gescheitert sind? Das Buch legt die Sollbruchstellen der globalen digitalen Zivilisation offen und weist Wege aus der Krise. Wenn die Menschheit alle anstehenden Probleme meistert, dann steht ihr irgendwann der Weg zu den Sternen offen.
Offline First Web Development
by Daniel SaubleDesign and implement a robust offline app experience using Sencha Touch and PouchDB About This Book * Understand the design principles behind a well-designed offline experience * Create the illusion of being online when you're really offline * Use common libraries to enhance the offline experience of mobile apps with this comprehensive guide Who This Book Is For Do you want to make your app experience more robust and delightful? Are you eager to write apps that cater to a wider audience, not just the Silicon Valley crowd? Do you need to persuade your peers that offline-first is a worthwhile development paradigm? If your answer to all or any one of these questions is yes, then this is the book is for you. Some previous coding and command-line experience would be useful, but is not required. What You Will Learn * Convince others that the offline-first paradigm is worth doing * Design the behavior of the app, taking offline, online, and the transition between those two states into account * Implement the offline/online experience that you've designed * Show the user what's happening under the hood with online/offline indicators and Good Mobile Messaging * Employ various strategies to cope with unreliable network conditions * Help the user resolve conflicts related to the "split-brain" problem * Choose intelligent defaults based on usage of the app * Use point-to-point networking to partially overcome a lack of Internet connectivity In Detail When building mobile apps, it's easy to forget about the moments when your users lack a good Internet connection. Try this: put your phone in airplane mode and open a few popular apps to see how they handle being offline. From Twitter to Pinterest to Apple Maps, some apps handle being offline better than others, but very few do it well. A poor offline experience will result in frustrated users who may stop using your app, or worse, turn to your competitor's apps. Expert or novice, this book will teach you everything you need to know about designing and building a rigorous offline app experience. By putting the offline experience first, you'll have a solid foundation to build upon, avoiding the unnecessary stress and frustration of trying to retrofit offline capabilities into your finished app. This basic principle, designing for the worst case scenario, could save you countless hours of wasted effort. Style and approach This book adopts an iterative approach to designing and building a mobile app, where each chapter builds on the one before, resulting in a fully-functional app that demonstrates the concepts taught, each one of which is explained through the use of an example.
Offset Lithographic Technology (4th edition)
by Kenneth F. Hird Charles E. FinleyOffset Lithographic Technology provides extensive coverage of electronic applications in all areas of printing. This edition includes in-depth coverage of electronic text generation, computer-to-plate operations, computer-controlled inking and printing, digital image generation, and electronic prepress (desktop publishing). A math and measurement chapter helps students master these important basic skills.
OGRE 3D 1.7 Application Development Cookbook
by Alex Peterson Ilya GrinblatThis is a cookbook with over 50 recipes offering solutions to common application development problems while creating graphics using OGRE 3D, with explained sample code and screenshots added in. Each recipe teaches you about a particular feature of OGRE 3D. If you are a C++ programmer with basic knowledge of OGRE 3D and want to enhance your knowledge about OGRE 3D further, then this book is for you. Basic knowledge of 3D graphics application development is required.
OGRE 3D 1.7 Beginner's Guide
by Felix KergerThis book is an example-driven introduction to OGRE 3D. Each example shows some new features and you learn step-by-step to create complex scenes with different effects using OGRE 3D. After several examples discussing one topic there is a do-it-yourself part where you will be challenged to solve problems on your own.If you have ever wanted to develop 3D applications with OGRE 3D, this example-driven book will enable you to do so. Understanding of C++ is needed to follow the examples in the book.
Oh, Bother: Winnie-the-Pooh is Befuddled, Too (A Smackerel-Sized Parody of Modern Life)
by Jennie EgerdieWelcome back to the Hundred Acre Wood as Winnie-the-Pooh and friends acclimate to the joys and worries of the 21st century in this heartfelt parody. The world has changed in the hundred years since A. A. Milne introduced us to Winnie-the-Pooh and his pals, but that doesn&’t mean our lovable friends haven&’t adapted to life in the twenty-first century. In this heartwarming, laugh-out-loud parody, Jennie Egerdie, author of the celebrated Frog and Toad are Doing Their Best, takes us along for some marvelous misadventures as the gang grapples with modern life&’s headaches and pesky predicaments. Like the rest of us, Pooh worries about what the dwindling bee population will do to his beloved honey, while Owl discovers how far too easily misinformation can spread online. Kanga hopes she can have a night off from raising Roo, and Eeyore is finally taking care of his mental health with the help of Dr Festinker, the neighborhood therapist (and skunk). Things may not always make sense in our world, but Winnie-the-Pooh always bounds ahead, day by day and smackeral by smackeral.
Oh My Goth
by Gena ShowalterA note from Jade Leighton’s journalYears ago, a tragic accident robbed me of my mother and emotions. Because I find beauty in darkness and thrive outside social norms, I’ve been labeled a “freak” at school. I know my continued apathy hurts my loved ones, but I’m not about to change. Nothing will ever hurt me again.Then I wake up in an alternate reality…and everything else has changed. Goth is in. I’m considered cool, and my archenemy—the formerly popular Mercedes—is the freak. But my real friends won’t talk to me...and the new boy is getting under my skin. As my world spins out of control, I’m desperate to return to normal. But the more time that passes, the less I’m sure what “normal” really is.
OK, Boomer: Using a Landline, Going to the Post Office, and Other Outdated Things You Don't Need Anymore
by Tiller PressA book of classic, hilarious &“OK, Boomer&”-isms, a perfect gift for the Baby Boomers we all know and love. Going to the bank. Leaving voicemails. Making Jell-O molds. Using encyclopedias. Wallpapering bathrooms. There are dozens of ridiculously antiquated items, activities, and phrases that Baby Boomers love—and don&’t realize have been outdated for more than a decade. And for some reason, no matter how hard Millennials and Gen Zers try to bring Boomers into the 21st century, they still don&’t seem to get it. They just can&’t let go of eating meatloaf, going on cruises, or buying fuzzy toilet seat covers. So rather than try to explain something to the Baby Boomers in your life, it might be time to just say, &“OK, Boomer.&” Containing more than fifty of the most common, cliched, and cringe-worthy Boomer-isms, OK, Boomer is a perfect gift for any exasperated Millennial or any Boomer willing to poke fun at themselves.
Ökonometrie und maschinelles Lernen: Basiswissen für Ökonomen (essentials)
by Silvio AndraeFür empirische Wirtschaftswissenschaftler gehören ökonometrische Methoden zum Standardwerkzeug. Die neuen Instrumente des maschinellen Lernens setzen sich langsam auch in der Volks- und Betriebswirtschaftslehre durch. Das Buch vermittelt Basiswissen zu den spezifischen Methoden des überwachten und unüberwachten Lernens sowie des Verstärkungslernens. Dabei werden die wesentlichen Unterschiede in Bezug auf Ziele, Methoden und Rahmenbedingungen zwischen den Methoden der Ökonometrie und des maschinellen Lernens dargestellt und erörtert.
Okta Administration: Implement enterprise-grade identity and access management for on-premises and cloud apps
by Lovisa Stenbacken Stjernlof HenkJan de VriesPlan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, multifactor authentication, and life cycle management for enhanced securitySet up, manage, and audit API access policiesBook DescriptionIAM, short for identity and access management, is a set of policies and technologies for ensuring the security of an organization through careful role and access assignment for users and devices. With this book, you'll get up and running with Okta, an identity and access management (IAM) service that you can use for both employees and customers.Once you've understood how Okta can be used as an IAM platform, you'll learn about the Universal Directory, which covers how to integrate other directories and applications and set up groups and policies. As you make progress, the book explores Okta's single sign-on (SSO) feature and multifactor authentication (MFA) solutions. Finally, you will delve into API access management and discover how you can leverage Advanced Server Access for your cloud servers and Okta Access Gateway for your on-premises applications.By the end of this Okta book, you'll have learned how to implement Okta to enhance your organization's security and be able to use this book as a reference guide for the Okta certification exam.What you will learnUnderstand different types of users in Okta and how to place them in groupsSet up SSO and MFA rules to secure your IT environmentGet to grips with the basics of end-user functionality and customizationFind out how provisioning and synchronization with applications workExplore API management, Access Gateway, and Advanced Server AccessBecome well-versed in the terminology used by IAM professionalsWho this book is forIf you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone who wishes to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary.
La ola que viene: Tecnología, poder y el gran dilema del siglo XXI
by Mustafa Suleyman Michael BhaskarESTAMOS A TIEMPO DE SALVAR EL MUNDO. ESTE LIBRO ES UNA LLAMADA DE ATENCIÓN SOBRE LOS DESCOMUNALES RIESGOS DE LA INTELIGENCIA ARTIFICIAL. «Fascinante, muy bien escrito, importante».Yuval Noah Harari «Una lectura esencial».Stephen Fry Estamos a punto de cruzar un umbral crítico en la historia de nuestra especie. Todo lo que conocemos va a cambiar.Pronto viviremos rodeados de una inteligencia artificial responsable de ejecutar tareas complejas: desde gestionar negocios y producir contenido digital ilimitado hasta dirigir servicios públicos fundamentales o mantener infraestructuras. Habitaremos un mundo de impresoras de ADN y ordenadores cuánticos, patógenos artificiales y armas autónomas, robots asistentes y energía abundante. Todo esto supone una transformación radical en la capacidad humana.No estamos preparados. Como cofundador de la empresa pionera DeepMind, Mustafa Suleyman ha estado en el epicentro de esta revolución llamada a convertirse en el mayor acelerador del progreso de la historia. Asegura que la próxima década estará marcada por esta gran ola de nuevas y poderosas innovaciones de rápida proliferación. Impulsadas por abrumadores incentivos estratégicos y comerciales, estas herramientas ayudarán a afrontar nuestros retos globales y crearán una enorme riqueza, pero también provocarán revueltas a una escala antes inimaginable. En La ola que viene, Suleyman (uno de los mayores expertos del planeta en sistemas inteligentes) demuestra cómo estas fuerzas amenazan seriamente las bases del orden mundial. Mientras nuestros frágiles gobiernos caminan sonámbulos hacia el desastre, nos enfrentamos a un dilema existencial: por un lado, enfrentarnos a los daños sin precedentes derivados de una exposición incontrolada a estas nuevas tecnologías; por otro, a la amenaza de una vigilancia tiránica y abusiva. ¿Conseguiremos abrir un estrecho punto de fuga entre la catástrofe y la distopía? La crítica ha dicho:«Este importante libro es un vívido toque de atención. En él se esbozan cuidadosamente las amenazas y oportunidades asociadas a los estimulantes avances científicos de los últimos años. La ola que viene está repleto de datos interesantes, argumentos fascinantes y observaciones convincentes; es una lectura esencial». Daniel Kahneman, Premio Nobel«El conocimiento de Mustafa Suleyman como tecnólogo, empresario y visionario es esencial... A través de una profunda y muy relevante investigación, este libro ofrece una visiónapasionante de algunos de los retos más importantes de nuestro tiempo». Al Gore, exvicepresidente de Estados Unidos «La revolución de la inteligencia artificial ya está en marcha, pero ¿la conocemos bien? La ola que viene presenta una guía erudita y lúcida tanto de lahistoria del cambio radical que ha supuesto la tecnología como de los profundos retos políticos que nos aguardan». Anne Applebaum «Este libro es inspirador y aterrador al mismo tiempo. Es una lección urgente para quienes no entienden las revoluciones tecnológicas que estamos viviendo y un desafío frontalpara quienes sí las comprenden. Este libro trata del futuro de la humanidad: tenemos que leerlo y actuar en consecuencia». David Miliband, exministro de Asuntos Exteriores del Reino Unido
Old and New Media after Katrina
by Diane NegraOn the fifth anniversary of Hurricane Katrina, this book examines the television coverage of September, 2005, and the manifestation of its legacy in a range of other media forms.