- Table View
- List View
The Cybersecurity Playbook for Modern Enterprise: An End-to-end Guide To Preventing Data Breaches And Cyber Attacks
by Jeremy WittkopThis book is for security practitioners, including analysts, engineers, or CISOs, who want to better understand cybersecurity challenges. It is also for beginners who want to get a holistic view of information security to prepare for a career in the cybersecurity field. Business leaders looking to learn about cyber threats and how they can protect their organizations from harm will find this book especially useful. Whether you're a beginner or a seasoned cybersecurity professional, this book has something new for everyone.
The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
by Allison CerraThe real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.
The Cybersecurity Self-Help Guide
by Arun SoniCybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.
The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense
by Donnie W. WendtThis book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. Who This Book is for: The primary audience is cybersecurity professionals looking to improve their organization's security posture by leveraging AI and ML-based security tools and combining them into a comprehensive strategy incorporating automation and ACD. This target audience will have a cybersecurity background and an interest in AI and ML. Higher education would be a secondary audience.
The Cyborg Handbook
by Chris Hables Gray Steven Mentor Heidi J. Figueroa-SarrieraThis handbook brings together key documents from the history of cyborgs as well as the best writing about cyborgs, including recent cyborg cutural theory. They cover the space technology, war, medicine and the imagination in the production of cyborgs.
The Cyborg Subject
by Garfield BenjaminThis book outlines a new conception of the cyborg in terms of consciousness as the parallax gap between physical and digital worlds. The contemporary subject constructs its own internal reality in the interplay of the Virtual and the Real. Reinterpreting the work of Slavoj Žižek and Gilles Deleuze in terms of the psychological and ontological construction of the digital, alongside the philosophy of quantum physics, this book offers a challenge to materialist perspectives in the fluid cyberspace that is ever permeating our lives. The inclusion of the subject in its own epistemological framework establishes a model for an engaged spectatorship of reality. Through the analysis of online media, digital art, avatars, computer games and science fiction, a new model of cyborg culture reveals the opportunities for critical and creative interventions in the contemporary subjective experience, promoting an awareness of the parallax position we all occupy between physical and digital worlds.
The DAM Book: Digital Asset Management for Photographers (O'reilly Ser.)
by Peter KroghOne of the main concerns for digital photographers today is asset management: how to file, find, protect, and re-use their photos. The best solutions can be found in The DAM Book, our bestselling guide to managing digital images efficiently and effectively. Anyone who shoots, scans, or stores digital photographs is practicing digital asset management (DAM), but few people do it in a way that makes sense. In this second edition, photographer Peter Krogh -- the leading expert on DAM -- provides new tools and techniques to help professionals, amateurs, and students: Understand the image file lifecycle: from shooting to editing, output, and permanent storage Learn new ways to use metadata and key words to track photo files Create a digital archive and name files clearly Determine a strategy for backing up and validating image data Learn a catalog workflow strategy, using Adobe Bridge, Camera Raw, Adobe Lightroom, Microsoft Expression Media, and Photoshop CS4 together Migrate images from one file format to another, from one storage medium to another, and from film to digital Learn how to copyright images To identify and protect your images in the marketplace, having a solid asset management system is essential. The DAM Book offers the best approach.
The DARPA Robotics Challenge Finals: Humanoid Robots To The Rescue (Springer Tracts In Advanced Robotics #121)
by Karl Iagnemma Matthew Spenko Stephen BuergerThe DARPA Robotics Challenge was a robotics competition that took place in Pomona, California USA in June 2015. The competition was the culmination of 33 months of demanding work by 23 teams and required humanoid robots to perform challenging locomotion and manipulation tasks in a mock disaster site. The challenge was conceived as a response to the Japanese Fukushima nuclear disaster of March 2011. The Fukushima disaster was seen as an ideal candidate for robotic intervention since the risk of exposure to radiation prevented human responders from accessing the site. This volume, edited by Matthew Spenko, Stephen Buerger, and Karl Iagnemma, includes commentary by the organizers, overall analysis of the results, and documentation of the technical efforts of 15 competing teams. The book provides an important record of the successes and failures involved in the DARPA Robotics Challenge and provides guidance for future needs to be addressed by policy makers, funding agencies, and the robotics research community. Many of the papers in this volume were initially published in a series of special issues of the Journal of Field Robotics. We have proudly collected versions of those papers in this STAR volume.
The DC Comics Guide to Digitally Drawing Comics
by Freddie E Williams Brian BollandAt last-the first guide to drawing comics digitally! Artists! Gain incredible superpowers...with the help of your computer! The DC Comics Guide to Digitally Drawing Comics shows how to give up pencil, pen, and paper and start drawing dynamic, exciting comics art entirely with computer tools. Author Freddie E Williams is one of DC Comics' hottest artists and a leader in digital penciling and inking-and here, in clear, step-by-step directions, he guides readers through every part of the digital process, from turning on the computer to finishing a digital file of fully inked comic art, ready for print. Creating a template, sketching on the computer, penciling, and finally inking digitally are all covered in depth, along with bold, timesaving shortcuts created by Williams, tested by years of trial and error. Step into the digital age, streamline the drawing process, and leap over the limitations of mere physical drawing materials with The DC Guide to Digitally Drawing Comics.From the Trade Paperback edition.
The DSLR Filmmaker's Handbook
by Barry Andersson Janie L. GeyenA how-to guide for getting professional-quality video from your DSLR Shooting HD Video with a video-enabled DSLR has many benefits and some tricky drawbacks that digital filmmakers and videographers can overcome to get professional results. The DSLR Filmmaker's Handbook helps filmmakers harness the HD video capabilities of their DSLRs to create professional-level video. Packed with professionally-tested techniques, this indispensible book serves as a training guide for the complex steps that must be taken before, during, and after filming. Teaches you the key tools and techniques for using your DSLR to shoot high-quality, professional-level video Distills dense information about filmmaking and filters it down to easily understood granules Shows you what to expect and what to avoid with your DSLR and how to maximize the visual look of your film Shares tools and techniques that have been used in real-world, independent movie-making environments The DSLR Filmmaker's Handbook shows you how to overcome any tricky drawbacks that you may face while shooting HD video with your DSLR.
The DSLR Filmmaker's Handbook
by Barry AnderssonLearn to shoot professional-quality HD footage with your DSLR Camera The DSLR Filmmaker's Handbook, 2nd Edition is the expert guide to getting professional movie-making results with an HD video-enabled DSLR camera. Fully updated to reflect the latest technology, this updated edition provides guidance toward best practices and techniques that maximize results. Shooting HD video with a DSLR has many benefits -- and also a few tricky drawbacks -- but this guide gives you the insight and training you need to overcome these challenges as you learn what to anticipate, how to work around it, and how to fix imperfections in post-production. Award winning independent filmmaker Barry Andersson walks you through the shooting process and shows you what to do before, during, and after filming to ensure high quality results. Most of today's DSLRs have the capacity to shoot HD video. This, combined with incredible low-light capabilities, shallow depth of field, and relatively low price point make these cameras an extremely attractive entry point for would-be independent filmmakers. This book shows you how to exploit your DSLR's capabilities to produce beautiful film, with step-by-step expert instruction. Understand the limitations of DSLR video Learn what to plan for before filming begins Exploit HD capabilities to maximize the film's visuals Produce professional-level, film-quality footage With thorough explanations and expert instruction, The DSLR Filmmaker's Handbook, 2nd Edition is the training you need to start shooting beautiful HD footage.
The Daily Show Presidential Twitter Library
by Trevor NoahAs seen on The Daily Show, an illustrated portrait of the Donald J. Trump Twitter account, with analysis and 'scholarly' commentary from the writers of The Daily Show and an introduction by Trevor Noah.In June 2017, just steps from Trump Tower in midtown Manhattan, The Daily Show with Trevor Noah opened The Donald J. Trump Presidential Twitter Library, a 4,000-square-foot museum space that gave the 45th president and his amazing Twitter legacy the respect they deserve. In the single weekend it was open to the public, the Library pop-up drew 7,500 visitors and had to turn away countless others.But the Presidential Twitter Library experience should not be limited to the elite coastal few. Not fair! All citizens, even the Mexican ones, should have the chance to see Donald Trump's tweets in their rightful context - organized and commented on in the fearless, hilarious, insightful voice of The Daily Show.This one-of-a-kind exhibition catalogue presents the Library's complete contents, including:The Masterpieces: In-depth critical appreciations of history's most important Trump tweets, from 'Very Stable Genius' to 'Covfefe' to 'Trump Tower Taco Bowl/I Love Hispanics!'The Greatest Battles: @realDonaldTrump's brutal Twitter campaigns against fellow Republicans, Diet Coke, women generally, and Kristen Stewart specificallySad! A Retrospective: a compendium of the many people, events and twists of fate that apparently made Donald Trump feel this human emotionTrumpstradamus: DJT's amazing 140-character predictions-none of which came true!The Hall of Nicknames: the greatest of Trump's monikers, from 'Lyin' Ted' to 'Low I.Q. Crazy Mika', accompanied by original caricature artworkTrump vs. Trump: You're going to want to sit for this one. Donald Trump has sometimes been known to contradict himself.Always the Best: the greatest boasts of the greatest boaster of all time, ever!Comprising hundreds of Trump tweets, and featuring a foreword by Pulitzer Prize-winning historian Jon Meacham, and even a place for readers to add their own future Trump tweet highlights - because he is making new Twitter history literally every day - The Donald J. Trump Presidential Twitter Library is a unique portrait of an artist whose masterworks will be studied by historians, grammarians, and mental health professionals for years to come.
The Dangers of Automation in Airliners: Accidents Waiting to Happen
by Jack J. HerschThe award-winning journalist delves “into the confluence of modern airplane technology and pilot behavior to probe how and why flight disasters happen” (BookTrib).Aviation automation has been pushed to its limits, with pilots increasingly relying on it. Autopilot, autothrottle, autoland, flight management systems, air data systems, inertial guidance systems. All these systems are only as good as their inputs which, incredibly, can go rogue. Even the automation itself is subject to unpredictable failure. And what of the pilots? They began flight training with their hands on the throttle and yoke, and feet on the rudder pedals. Then they reached the pinnacle of their careers—airline pilot—and suddenly they were going hours without touching the controls other than for a few minutes on takeoff and landing. Are their skills eroding? Is their training sufficient to meet the demands of today’s planes?The Dangers of Automation in Airliners delves deeply into these questions. You’ll be in the cockpits of the two doomed Boeing 737 MAXs, the Airbus A330 lost over the South Atlantic, and the Bombardier Q400 that stalled over Buffalo. You’ll discover exactly why a Boeing 777 smacked into a seawall, missing the runway on a beautiful summer morning. And you’ll watch pilots battling—sometimes winning and sometimes not—against automation run amok. This book also investigates the human factors at work. You’ll learn why pilots might overlook warnings or ignore cockpit alarms. You’ll observe automation failing to alert aircrews of what they crucially need to know while fighting to save their planes and their passengers.The future of safe air travel depends on automation. This book tells its story.
The Dark Mafia: Organized Crime in the Age of the Internet
by Marcel Danesi Antonio NicasoThis book explores how organized crime has adapted and evolved in sync with ever-expanding technologies to update its popular image and to conduct its covert operations. It shows how organized crime operates in dark virtual spaces and how it can now form a dynamic interactive system with legitimate online spaces, solidifying its criminal exploits and resources, and making them attractive to a new generation of computer users. Focusing on Italian Mafias, Russian and Georgian criminal groups and drug cartels, and Asian crime syndicates such as Yakuza and Triads, this book aims to describe and explain the reasons behind the continuity of online and offline crime, taking into consideration whether or not internet culture has radically changed the way we perceive organized crime and if so how, and thus how the shift in popular imagery that the internet has brought about affects its actual illegal activities. We also consider how organized crime has shifted its locale from the physical to the virtual, how cybercrime has allowed criminal organizations to adapt and reinvent themselves, and how the police now use technology against organized crime. To better understand the new generation of criminals, it is becoming increasingly urgent to understand the latest technologies and how criminals utilize them. The Dark Mafia is an engaging and accessible introduction to understanding virtual organized crime. It will appeal to students and scholars of criminology, sociology, policing, and all those interested in the digital age of organized crime.
The Dark Net
by Jamie BartlettAn Independent and New Statesman Book of the YearBeyond the familiar online world that most of us inhabit--a world of Google, Facebook, and Twitter--lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.In this important and revealing book, Jamie Bartlett takes us deep into the digital underworld and presents an extraordinary look at the internet we don't know. Beginning with the rise of the internet and the conflicts and battles that defined its early years, Bartlett reports on trolls, pornographers, drug dealers, hackers, political extremists, Bitcoin programmers, and vigilantes--and puts a human face on those who have many reasons to stay anonymous.Rich with historical research and revelatory reporting, The Dark Net is an unprecedented, eye-opening look at a world that doesn't want to be known.m the Hardcover edition.
The Dark Side of Game Play: Controversial Issues in Playful Environments (Routledge Advances in Game Studies)
by Torill Elvira Mortensen Jonas Linderoth Ashley Ml BrownGames allow players to experiment and play with subject positions, values and moral choice. In game worlds players can take on the role of antagonists; they allow us to play with behaviour that would be offensive, illegal or immoral if it happened outside of the game sphere. While contemporary games have always handled certain problematic topics, such as war, disasters, human decay, post-apocalyptic futures, cruelty and betrayal, lately even the most playful of genres are introducing situations in which players are presented with difficult ethical and moral dilemmas. This volume is an investigation of "dark play" in video games, or game play with controversial themes as well as controversial play behaviour. It covers such questions as: Why do some games stir up political controversies? How do games invite, or even push players towards dark play through their design? Where are the boundaries for what can be presented in a games? Are these boundaries different from other media such as film and books, and if so why? What is the allure of dark play and why do players engage in these practices?
The Dark Side of Silicon
by Axel Jantsch Amir M. Rahmani Pasi Liljeberg Ahmed Hemani Hannu TenhunenThis book presents the state-of-the art of one of the main concerns with microprocessors today, a phenomenon known as "dark silicon". Readers will learn how power constraints (both leakage and dynamic power) limit the extent to which large portions of a chip can be powered up at a given time, i. e. how much actual performance and functionality the microprocessor can provide. The authors describe their research toward the future of microprocessor development in the dark silicon era, covering a variety of important aspects of dark silicon-aware architectures including design, management, reliability, and test. Readers will benefit from specific recommendations for mitigating the dark silicon phenomenon, including energy-efficient, dedicated solutions and technologies to maximize the utilization and reliability of microprocessors.
The Darkening Web: The War for Cyberspace
by Alexander Klimburg"A chilling but well-informed and readable tour of cyber interdependence. Anyone interested in our growing global vulnerabilities should read this book.”—Joseph S. Nye, Jr., author of The Future of PowerNo single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states’ ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict—ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war—but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today—and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War—and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy (Palgrave Studies in Cybercrime and Cybersecurity)
by Angus BancroftThis book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. Cybersecurity is increasingly seen as essential yet it is also a point of contention between citizens, states, non-governmental organisations and private corporations as each grapples with existing and developing technologies. The increased importance of privacy online has sparked concerns about the loss of confidentiality and autonomy in the face of state and corporate surveillance on one hand, and the creation of ungovernable spaces and the facilitation of terrorism and harassment on the other. These differences and disputes highlight the dual nature of the internet: allowing counter-publics to emerge and providing opportunities for state and corporate domination through control of the data infrastructure. The Darknet and Smarter Crime argues that, far from being a dangerous anarchist haven, the darknet and the technologies used within it could have benefits and significance for everyone online. This book engages with a number of debates about the internet and new communication technologies, including: surveillance and social control, anonymity and privacy, the uses and abuses of data encryption technologies and cyber-cultures and collective online identities
The Data Analysis Workshop: Solve business problems with state-of-the-art data analysis models, developing expert data analysis skills along the way
by Shubhangi Hora Gururajan Govindan Konstantin PalagachevLearn how to analyze data using Python models with the help of real-world use cases and guidance from industry experts Key Features Get to grips with data analysis by studying use cases from different fields Develop your critical thinking skills by following tried-and-true data analysis Learn how to use conclusions from data analyses to make better business decisions Book Description Businesses today operate online and generate data almost continuously. While not all data in its raw form may seem useful, if processed and analyzed correctly, it can provide you with valuable hidden insights. The Data Analysis Workshop will help you learn how to discover these hidden patterns in your data, to analyze them, and leverage the results to help transform your business. The book begins by taking you through the use case of a bike rental shop. You'll be shown how to correlate data, plot histograms, and analyze temporal features. As you progress, you'll learn how to plot data for a hydraulic system using the Seaborn and Matplotlib libraries, and explore a variety of use cases that show you how to join and merge databases, prepare data for analysis, and handle imbalanced data. By the end of the book, you'll have learned different data analysis techniques, including hypothesis testing, correlation, and null-value imputation, and will have become a confident data analyst. What you will learn Get to grips with the fundamental concepts and conventions of data analysis Understand how different algorithms help you to analyze the data effectively Determine the variation between groups of data using hypothesis testing Visualize your data correctly using appropriate plotting points Use correlation techniques to uncover the relationship between variables Find hidden patterns in data using advanced techniques and strategies Who this book is for The Data Analysis Workshop is for programmers who already know how to code in Python and want to use it to perform data analysis. If you are looking to gain practical experience in data science with Python, this book is for you.
The Data Bank Society: Organizations, Computers and Social Freedom (Routledge Revivals)
by Mike Stone Malcolm WarnerThis study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.
The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business (Wiley Series on Parallel and Distributed Computing #90)
by Mark Parsons Malcolm Atkinson Rob Baxter David Snelling Peter Brezany Jano Van Hemert Oscar Corcho Michelle GaleaComplete guidance for mastering the tools and techniques of the digital revolution With the digital revolution opening up tremendous opportunities in many fields, there is a growing need for skilled professionals who can develop data-intensive systems and extract information and knowledge from them. This book frames for the first time a new systematic approach for tackling the challenges of data-intensive computing, providing decision makers and technical experts alike with practical tools for dealing with our exploding data collections. Emphasizing data-intensive thinking and interdisciplinary collaboration, The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business examines the essential components of knowledge discovery, surveys many of the current research efforts worldwide, and points to new areas for innovation. Complete with a wealth of examples and DISPEL-based methods demonstrating how to gain more from data in real-world systems, the book: Outlines the concepts and rationale for implementing data-intensive computing in organizations Covers from the ground up problem-solving strategies for data analysis in a data-rich world Introduces techniques for data-intensive engineering using the Data-Intensive Systems Process Engineering Language DISPEL Features in-depth case studies in customer relations, environmental hazards, seismology, and more Showcases successful applications in areas ranging from astronomy and the humanities to transport engineering Includes sample program snippets throughout the text as well as additional materials on a companion website The Data Bonanza is a must-have guide for information strategists, data analysts, and engineers in business, research, and government, and for anyone wishing to be on the cutting edge of data mining, machine learning, databases, distributed systems, or large-scale computing.
The Data Book: Collection and Management of Research Data (Chapman & Hall/CRC Interdisciplinary Statistics)
by Meredith ZozusThe Data Book: Collection and Management of Research Data is the first practical book written for researchers and research team members covering how to collect and manage data for research. The book covers basic types of data and fundamentals of how data grow, move and change over time. Focusing on pre-publication data collection and handling, the text illustrates use of these key concepts to match data collection and management methods to a particular study, in essence, making good decisions about data. The first section of the book defines data, introduces fundamental types of data that bear on methodology to collect and manage them, and covers data management planning and research reproducibility. The second section covers basic principles of and options for data collection and processing emphasizing error resistance and traceability. The third section focuses on managing the data collection and processing stages of research such that quality is consistent and ultimately capable of supporting conclusions drawn from data. The final section of the book covers principles of data security, sharing, and archival. This book will help graduate students and researchers systematically identify and implement appropriate data collection and handling methods.
The Data Hero Playbook: Developing Your Data Leadership Superpowers
by Malcolm HawkerA powerful new mindset for data leaders in any organization In The Data Hero Playbook: Developing Your Data Leadership Superpowers, veteran data professional and thought leader Malcolm Hawker offers fresh and exciting new ways to collect, manage, and use data. Called “Heroic Data Leadership,” Hawker's new mindset for data professionals will unlock the true potential of your organization's data. It puts to bed the limiting, counterproductive mindsets that often plague data leaders and offers original and effective alternatives you can apply immediately to generate tangible business results. The book shows you how to re-center customer satisfaction within your data strategy and convincingly demonstrates why sound data management must be paired with the delivery of value to the customer in order to have a significant impact on your company's bottom line. Inside the book: Step-by-step recommendations for productive behaviors and best practices within your data teams Illuminating quotes and anecdotes from data professionals leading data functions at large companies today Narratives and stories explaining how to transition from stale, limiting data mindsets to more productive and effective approaches An essential resource for data professionals at organizations of all types and sizes, The Data Hero Playbook is the hands-on roadmap to data leadership that managers, analysts, executives, entrepreneurs, and founders have been waiting for.
The Data Journalism Handbook: How Journalists Can Use Data to Improve the News
by Jonathan Gray Lucy Chambers Liliana BounegruWhen you combine the sheer scale and range of digital information now available with a journalist’s "nose for news" and her ability to tell a compelling story, a new world of possibility opens up. With The Data Journalism Handbook, you’ll explore the potential, limits, and applied uses of this new and fascinating field.This valuable handbook has attracted scores of contributors since the European Journalism Centre and the Open Knowledge Foundation launched the project at MozFest 2011. Through a collection of tips and techniques from leading journalists, professors, software developers, and data analysts, you’ll learn how data can be either the source of data journalism or a tool with which the story is told—or both.Examine the use of data journalism at the BBC, the Chicago Tribune, the Guardian, and other news organizationsExplore in-depth case studies on elections, riots, school performance, and corruptionLearn how to find data from the Web, through freedom of information laws, and by "crowd sourcing"Extract information from raw data with tips for working with numbers and statistics and using data visualizationDeliver data through infographics, news apps, open data platforms, and download links