Title search results
Showing 1 - 20 of 49077 items
Beyond Getting By: The Financial Diet's Guide to Abundant and Intentional Living
By Holly Trantham. 2024
A beautiful, full-color guide to living with money, not for money, packed with fun, tangible advice from the women behind…
The Financial Diet. &“Beyond Getting By will make you feel better, not worse, about your money and your life.&”—Tiffany &“the Budgetnista&” Aliche, New York Times bestselling author of Get Good with MoneyThe girlboss came in many forms, and she struggled valiantly against our increasing exhaustion at her brand of pinkwashed-capitalism-as-liberation—but it&’s time to put her to rest. Yes, money is essential to life, and managing it well can be the difference between freedom and constraint. But once you have enough, the focus should be on converting it into things that are meaningful to you: more time with the people you love, more creativity, more days to just vibe on the couch.In Beyond Getting By, the women behind The Financial Diet teach you how to create (and pay for) a life you truly enjoy—and that you can be proud of. They show you how to push beyond what society tells you will make you happy to determine what you actually want, with specific advice and interactive exercises on • how to define your own budget philosophy by no longer chasing fast fashion and instant gratification, instead allowing the unlikely duo of Sigmund Freud and Elizabeth Warren to guide your budgeting• how the idea that we have equal opportunity is bullshit—and how to start a self-advocacy journal in order to kill it in that next raise negotiation• how to stave off burnout by valuing your personal life with as much care as your career, in addition to figuring out the true worth of your time Beyond Getting By is for the woman interested in a life where money is simply a tool and never a reflection of her worth. It&’s for the woman who understands the limits of gamifying personal finance, and that following trends isn&’t the same as creating a sustainable, wealth-generating plan for the future.Networks Attack Detection on 5G Networks using Data Mining Techniques (Wireless Communications and Networking Technologies)
By Sagar Dhanraj Pande, Aditya Khamparia. 2024
Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent…
years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using machine learning and artificial intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, deep learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.This book: Covers emerging technologies of network attacks and management aspects. Presents artificial intelligence techniques for networks and resource optimization, and toward network automation, and security. Showcases recent industrial and technological aspects of next-generation networks Illustrates artificial intelligence techniques to mitigate cyber-attacks, authentication, and authorization challenges. Explains smart, and real-time monitoring services, multimedia, cloud computing, and information processing methodologies in 5G networks. It is primarily for senior undergraduates, graduate students and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.The Algebra of Wealth: A Simple Formula for Financial Security
By Scott Galloway. 2024
A must-have guide to optimizing your life for wealth and success, from bestselling author, NYU professor, and co-host of the…
Pivot podcast Scott Galloway.Today's workers have more opportunities and mobility than any generation before. They also face unprecedented challenges, including inflation, labor and housing shortages, and climate volatility. Even the notion of retirement is undergoing a profound rethink, as our life spans extend and our relationship with work evolves. In this environment, the tried-and-true financial advice our parents followed no longer applies. It's time for a new playbook.In The Algebra of Wealth, Galloway lays bare the rules of financial success in today's economy. In his characteristic unvarnished, no-BS style, he explains what you need to know in order to better your chances for economic security no matter what. You&’ll learn:How to find and follow your talent, not your passion, when making career decisionsHow to ride and optimize big economic waves (hard truth: market dynamics always trump individual achievement)What small steps you can take that pay big returns later, including diversification and tax planningHow stoicism can help you minimize spending and develop better financial habitsBursting with practical, game-changing advice from one of the world&’s most popular business school professors, The Algebra of Wealth is the practical guidebook you need to win today&’s wealth game.Privacy and Identity Management. Sharing in a Digital World: 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers (IFIP Advances in Information and Communicatio
By Felix Bieker, Silvia De Conca, Nils Gruschka, Meiko Jensen, Ina Schiering. 2024
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy…
and Identity Management, held in Oslo, Norway during August 8 - 11, 2023. The 21 full papers, including 2 workshops papers, presented in this book were carefully reviewed and selected from 30 submissions. The proceedings also contain two invited talks. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.Shared-Memory Synchronization (Synthesis Lectures on Computer Architecture)
By Michael L. Scott, Trevor Brown. 2024
This book offers a comprehensive survey of shared-memory synchronization, with an emphasis on “systems-level” issues. It includes sufficient coverage of…
architectural details to understand correctness and performance on modern multicore machines, and sufficient coverage of higher-level issues to understand how synchronization is embedded in modern programming languages.The primary intended audience for this book is “systems programmers”—the authors of operating systems, library packages, language run-time systems, concurrent data structures, and server and utility programs. Much of the discussion should also be of interest to application programmers who want to make good use of the synchronization mechanisms available to them, and to computer architects who want to understand the ramifications of their design decisions on systems-level code.Proceedings of 3rd 2023 International Conference on Autonomous Unmanned Systems: Volume III (Lecture Notes in Electrical Engineering #1173)
By Yi Qu, Mancang Gu, Yifeng Niu, Wenxing Fu. 2024
This book includes original, peer-reviewed research papers from the 3rd ICAUS 2023, which provides a unique and engaging platform for…
scientists, engineers and practitioners from all over the world to present and share their most recent research results and innovative ideas. The 3rd ICAUS 2023 aims to stimulate researchers working in areas relevant to intelligent unmanned systems. Topics covered include but are not limited to: Unmanned Aerial/Ground/Surface/Underwater Systems, Robotic, Autonomous Control/Navigation and Positioning/ Architecture, Energy and Task Planning and Effectiveness Evaluation Technologies, Artificial Intelligence Algorithm/Bionic Technology and their Application in Unmanned Systems.The papers presented here share the latest findings in unmanned systems, robotics, automation, intelligent systems, control systems, integrated networks, modelling and simulation. This makes the book a valuable resource for researchers, engineers and students alike.Human-Computer Interaction: 9th Iberoamerican Workshop, HCI-COLLAB 2023, Buenos Aires, Argentina, September 13–15, 2023, Revised Selected Papers (Communications in Computer and Information Science #1877)
By Pablo H. Ruiz, Vanessa Agredo-Delgado, Alicia Mon. 2024
This book constitutes the referred proceedings of the 9th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLLAB 2023, held in Buenos Aires,…
Argentina, during September 13–15, 2023. The 23 full papers presented in this book were carefully reviewed and selected from 84 submissions. They cover a variety of topics related to HCI such as: Emotional Interfaces, Usability, Video Games and Gamification, Computational Thinking, Internet of Things (IoT), Software Engineering, ICT in Education, Augmented and Mixed Virtual Reality for Education, Emotional Interfaces, Adaptive Instructional Systems, Accessibility, Artificial Intelligence in HCI, Industry 4. 0 and HCI, Infotainment Systems, Intelligent Systems, Collaborative Work and Learning, Cognition, and Interaction, among others.Evolution in Signal Processing and Telecommunication Networks: Proceedings of 8th International Conference on Microelectronics Electromagnetics and Telecommunications (ICMEET 2023) (Lecture Notes in Electrical Engineering #1155)
By Vikrant Bhateja, P. Satish Rama Chowdary, Wendy Flores-Fuentes, Shabana Urooj, Rudra Sankar Dhar. 2024
The book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics, and telecommunication. It contains…
original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2023), organized by Department of Electronics and Communication Engineering, National Institute of Technology Mizoram, India during October 6–7, 2023. The book is divided into two volumes, and it covers papers written by scientists, research scholars, and practitioners from leading universities, engineering colleges, and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today’s society.Reliability Engineering for Industrial Processes: An Analytics Perspective (Springer Series in Reliability Engineering)
By P. K. Kapur, Hoang Pham, Gurinder Singh, Vivek Kumar. 2024
This book explores how transformative changes driven by the new-age economy can bring about improvements in a company's engineering and…
manufacturing capabilities. The new-age economy is driven by advanced engineering and manufacturing practices, processes, and technologies, including the Internet of Things (IoT), Cloud Computing, Blockchain, Artificial Intelligence, Robotics, Cyber-Physical Systems (CPS), and Internet-enabled systems to automate industrial processes. Today's business dynamics are governed by uncertainties, disruptions, complexities, and ambiguities that demand quicker and more intelligent decisions. These changes could relate a renaissance in the company's engineering and manufacturing capabilities. To sustain these volatile and ever-changing business dynamics, Industry 4.0 and 5.0 have revolutionized how organizations operate and make intelligent business decisions. Moreover, the extensive role of business analytics has overcome the limitations ofclassical computing through new technologies and intelligent computing methodologies. Over the past few years, much emphasis has been given to investing in developing hardware and programming frameworks for achieving computational intelligence using fuzzy logic, evolutionary computation, neural networks, probabilistic methods, and learning theory. Within this frame of reference, the reliability, quality, and maintenance of complex industrial and manufacturing systems are essential for organizations to utilize them successfully for informed decisions. This book focuses on studies that provide new solutions for system reliability, quality, security, and maintainability using quantitative and qualitative research. It emphasizes developments and problems in systems engineering management, systems integration, software and hardware engineering, and the development process.Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2023 (Lecture Notes in Networks and Systems #918)
By Atul Chaturvedi, Sartaj Ul Hasan, Bimal Kumar Roy, Boaz Tsaban. 2024
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by…
PSIT, Kanpur, India during 27–29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.Computational Optical Imaging: Principle and Technology (Advances in Optics and Optoelectronics)
By Zhengjun Liu, Xuyang Zhou, Shutian Liu. 2024
This book highlights a comprehensive introduction to the principles and calculation methods of computational optical imaging. Integrating optical imaging and…
computing technology to achieve significant performance improvements, computational optical imaging has become an active research field in optics. It has given rise to the emerging of new concepts such as computational imaging, computational measurement and computational photography. As high-performance image detectors make image measurements discrete and digital, images are mostly recorded in the form of discrete data, almost replacing the continuous medium used for pattern recording. Computational optical imaging technology has become an effective way for people to study microscopic imaging. At present, different imaging systems are composed of continuous optical elements such as lenses and prisms or discrete optical elements such as spatial light modulators or digital micro-mirror devices. The current computing technology has permeated all aspects of imaging systems and gradually promotes the digitization of optical imaging systems. This book summarizes the representative work done in this field and introduces the latest results. Computing technology plays an important bridging role between theories of optics and experimental systems, which inspires more comprehensive and in-depth research. It has the advantages of high repeatability, flexibility, strong computing power and low cost. In this multidisciplinary field, researchers in computer science, optics and information science have joined together to extend its depth and breadth. Targeting cutting-edge issues to be solved in computational optics, this book introduces a variety of methods that involve theoretical innovations and technical breakthroughs in imaging resolution, the field of view, imaging speed, and computing speed. It intends to provide a handy reference and technical support for graduate students, researchers and professionals engaged in the study and practice of computational optical imaging.This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held…
in Yanuca Island, Fiji, during December 4–6, 2023. The 11 full papers presented in this book were carefully reviewed and selected from 35 submissions. They cover a variety of topics, including cybersecurity, AI security, machine learning security, encryption, authentication, data security and privacy, cybersecurity forensic analysis, vulnerability analysis, malware analysis, anomaly and intrusion detection.Universal Design in Video Games: Active Participation Through Accessible Play (Human–Computer Interaction Series)
By Adam Palmquist, Izabella Jedel, Ole Goethe. 2024
As participation in game related activities increases around the world and across a larger part of the population, it is…
obvious that games are not just an entertainment medium for children or young people. Games can be used to accomplish different purposes for different groups of people in society. Developing a universal designed game involves more than adding a cast of diverse characters. Games with universal design, at their core, are experiences that are designed from the ground up to be accessible to everyone – through mechanics, options, and user experience. This book explains the meaning and need for universal design in video games and sheds light on important disciplines. Researchers define a universal designed game as a video game that actively welcomes all players. When players connect authentically with a video game, they’re much more likely to engage with the content. Conversely, when players can’t physically play a game, or don’t see characters that look like them, they feel isolated and miss out on beneficial opportunities to learn and collaborate. Universal design maximizes the impact of playing games, for instance, by ensuring that they’re accessible, empowering and representative for every participant.Rich AF: The Winning Money Mindset That Will Change Your Life
By Vivian Tu. 2023
NEW YORK TIMES BESTSELLERFrom TikTok star and Your (favorite) Rich BFF Vivian Tu, the definitive book on personal finance for…
a new generationWhen Vivian Tu started working on Wall Street fresh from undergrad, all she knew was that she was making more money than she had ever seen in her life. But it wasn&’t until she found a mentor of her own on the trading floor that she began to understand what wealthy people knew intuitively—the secrets to beating the proverbial financial game that has, for too long, been male, pale, and stale.Building on the lessons she learned on Wall Street about money and the markets, Vivian now offers her best personal finance tips and tricks to readers of all ages and demographics, so that anyone can get rich, whether you grew up knowing the rules to the game or not. Vivian will be your mentor, dispensing fresh, no-BS advice on how to think like a rich person and create smart money habits. Throughout the pages of Rich AF, Vivian will break down her best recommendations to help you: Maximize your earnings to get more out of your 9-to-5Understand the differences between savings accounts, and where you should keep your moneyIdentify the tax strategies and (legal) loopholes you need to retire in styleOvercome investing fears to secure wealth for generationsAnd much more!Rich AF will equip readers with the tools and knowledge to not only understand the financial landscape, but to build a financial strategy of their own. And with Your Rich BFF at your side, you&’ll be able to start your financial journey already in an affluent mindset, making the most of your money and growing your wealth for years to come.Sorted!
By John McGuire. 2012
When it looked like his businesses were going down the tubes John McGuire slept in his office and started a…
battle for financial survival.He knows what it's like to see everything you've worked for about to collapse around your ears.He knows what it's like to lie awake at night wondering how you're going to deal with the bank the next day.He knows what it's like to get up in the morning determined to somehow figure out a way out of the mess and to create a viable plan for survival and, indeed, a vision for the future.He's done it and he believes the principles he's used to save his business can help everyone.It's all about taking a long hard look at reality and realising that there are always options.In Sorted! - through a mixture of startling personal revelations and sound professional advice - he tells you how you too can survive and thrive in these turbulent economic times.Sorted! is essential reading for the anyone who cares about their financial futureSh**ged. Married. Annoyed.: The Sunday Times No. 1 Bestseller
By Chris Ramsey, Rosie Ramsey. 2020
Whether you've barely recovered from spending lockdown with your other half or desperately heading back to the clubs to meet…
'the one', SH**GED. MARRIED. ANNOYED. is here to see you through . . .THE SUNDAY TIMES BESTSELLER FROM THE STARS OF THE CHART-TOPPING PODCASTNOW FEATURING A BONUS CHAPTER'An absolute triumph' Daisy May Cooper'These two are bloody hilarious' Zoe Sugg'A hilarious look at the highs and lows of relationships' Sun__________SH**GED.Hitting the bars, necking drinks and necking strangers, stumbling home, one-night-stands, nightmare dates, thinking this one's alright, ghosting, tears, more drinking, living off late-night chips.MARRIED.Meeting 'the one', weekends away, moving in, declaring life-long love, stags and hens, the perfect wedding, the honeymoon period, getting through the hard bits together, starting a family.ANNOYED.Can you close the bathroom door if you're doing that? Sleepless nights, arguing about whose turn it is to change the baby's nappy, toys everywhere, only having two drinks, still being hungover, wondering when it all stopped being easy.Whether you're sh**ged, married, annoyed, or all of the above, Chris and Rosie Ramsey write hilariously and with honesty about the ups and downs of dating, relationships, arguing, parenting and everything in between.Convergence of Blockchain and Internet of Things in Healthcare (Smart Engineering Systems: Design and Applications)
By Arun Kumar Rana, Vishnu Sharma, Ajay Rana, Maksud Alam and Suman Lata Tripathi. 2024
The Internet of Things (IoT) and blockchain are two new technologies that combine elements in many ways. A system where…
the virtual and physical worlds interact is created by integrating pervasive computing, ubiquitous computing, communication technologies, sensing technologies, Internet Protocol, and embedded devices. A massive number of linked devices and vast amounts of data present new prospects for developing services that can directly benefit the economy, environment, society, and individual residents. Due to the size of IoT and insufficient data security, security breaches may have a huge impact and negative effects. IoT not only connects gadgets but also people and other entities, leaving every IoT component open to a wide variety of assaults. The implementation and application of IoT and blockchain technology in actual scientific, biomedical, and data applications are covered in this book. The book highlights important advancements in health science research and development by applying the distinctive capabilities inherent to distributed ledger systems. Each chapter describes the current uses of blockchain in real-world data collection, medicine development, device tracking, and more meaningful patient interaction. All of these are used to create opportunities for expanding health science research. This paradigm change is studied from the perspectives of pharmaceutical executives, biotechnology entrepreneurs, regulatory bodies, ethical review boards, and blockchain developers.Key Features: Provides a foundation for the implementation process of blockchain and IoT devices based on healthcare-related technology Image processing and IoT device researchers can correlate their work with other requirements of advanced technology in the healthcare domain Conveys the latest technology, including artificial intelligence and machine learning, in healthcare-related technology Useful for the researcher to explore new things like security, cryptography, and privacy in healthcare related technology Tailored for people who want to start in healthcare-related technology with blockchain and IoT This book is primarily for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science and engineering, and biomedical engineering.Intelligent Security Solutions for Cyber-Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems)
By Vandana Mohindru Sood, Yashwant Singh, Bharat Bhargava, Sushil Kumar Narang. 2024
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and…
involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lightweight cryptographic solutions, and CPS forensics, etc. • Emphasizes machine learning methods for behavior-based intrusion detection in cyber-physical systems (CPSs), resilient machine learning for networked CPS, fog computing industrial CPS, etc. • Elaborates classification of network abnormalities in Internet of Things-based cyber-physical systems (CPSs) using deep learning. • Includes case studies and applications in the domain of smart grid systems, industrial control systems, smart manufacturing, social network and gaming, electric power grid and energy systems, etc.Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications (Texts in Computer Science)
By Joakim Kävrestad, Marcus Birath, Nathan Clarke. 2024
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to…
ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises.This enhanced third edition describes practical digital forensics with open-source tools and includes an outline of current challenges and research directions.Topics and features:Outlines what computer forensics is, and what it can do, as well as what its limitations areDiscusses both the theoretical foundations and the fundamentals of forensic methodologyReviews broad principles that are applicable worldwideExplains how to find and interpret several important artifactsDescribes free and open-source software toolsFeatures content on corporate forensics, ethics, SQLite databases, triage, and memory analysisIncludes new supporting video lectures on YouTubeThis easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations.Custom Components in Architecture: Strategies for Customizing Repetitive Manufacturing
By Dana Gulling. 2024
This book offers architects strategies in the design and manufacturing of custom, repetitively manufactured building components.A total of 36 case…
studies from around the globe demonstrate the diversity of CRM in architecture and are contributed by architecture firms, including Diller Scofidio + Renfro, Kengo Kuma & Associates, Abin Design Studio, Behnisch Architekten, Belzberg Architects, and many more. The book is organized by manufacturing process and covers the use of various types of glass, clay, plastic, metal, wood, plaster, and concrete. Each process is described with diagrams and text and expanded with one or more examples of customized building components. Projects included are of buildings of various types, sizes, and clients, and many deviate from the typical manufacturing process as they include a secondary process (e.g. casting glass, then slumping it), special tooling modifications (e.g. dams used to subdivide a mold), post-production processes, or other notable manufacturing features. Each case study includes a project overview, behind‐the‐scenes images of the component manufacturing, and original diagrams that illustrate how those components were customized.Custom Components in Architecture will be essential reading for any architect interested in building design details and keeping up-to-speed on material advances. Upper-level students of digital architecture, fabrication, and building technology will also find this a useful tool.