Title search results
Showing 1 - 20 of 53839 items
Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
By Madhusudhan H. S., Satish Kumar T., Punit Gupta, Dinesh Kumar Saini, Kashif Zia. 2024
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations…
that local devices are unable to handle. The computing power and flexibility that have made the cloud so popular do not come without challenges. It is particularly challenging to decide which resources to use, even when they have the same configuration but different levels of performance because of the variable structure of the available resources. Cloud data centers can host millions of virtual machines, and where to locate these machines in the cloud is a difficult problem. Additionally, fulfilling optimization needs is a complex problem.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. It also looks at virtual machine placement techniques that can improve quality-of-service (QoS) in service-oriented architecture (SOA) computing. The aims of virtual machine placement include minimizing energy usage, network traffic, economical cost, maximizing performance, and maximizing resource utilization. Other highlights of the book include: Improving QoS and resource efficiency Fault-tolerant and reliable resource optimization models A reactive fault tolerance method using checkpointing restart Cost and network-aware metaheuristics. Virtual machine scheduling and placement Electricity consumption in cloud data centers Written by leading experts and researchers, this book provides insights and techniques to those dedicated to improving cloud computing and its services.Game Design Deep Dive: Soulslike
By Joshua Bycer. 2024
Game Design Critic Joshua Bycer is back with another entry in the Game Design Deep Series to focus on the…
youngest genre yet: soulslikes. Over a decade, From Software defined a new genre that has led to studios chasing after them hit after hit. In this book, Josh will cover the history of the genre and popular soulslike games of the 2010s and discuss what aspects of design make a game a soulslike. The first book looking at the history of the genre A breakdown of both action and RPG design for fans and designers of both A lesson on difficulty in games and why harder doesn’t mean betterThe third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on…
the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a modern, 21st-century Linux system, such as the Raspberry Pi OS, is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. This third volume includes a beginner’s compendium of essential text-based Linux commands, a complete tutorial on the most important Raspberry Pi OS Text Editors, a description of uses of the git command, and a thorough explication of container virtualization with LXC/LXD and Docker.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volume can also be adopted in a more formal learning environment to supplement and extend the basic knowledge of a Linux operating system.The Zero Trust Framework and Privileged Access Management (PAM)
By Ravindra Das. 2024
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business…
is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion
By Ashley Firth. 2024
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population,…
or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #194)
By Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Limits of AI - theoretical, practical, ethical (Technik im Fokus)
By Klaus Mainzer, Reinhard Kahle. 2024
Artificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the…
perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2037)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part III (Communications in Computer and Information Science #2039)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Decision Support Systems XIV. Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions: 10th International Conference on Decision Support System Technology, ICDSST 2024, Porto, Portugal, June 3–5, 2024, Proceedings
By Sérgio Pedro Duarte, António Lobo, Boris Delibašić, Daouda Kamissoko. 2024
This book constitutes the proceedings of the 10th International Conference on Decision Support Systems Technologies, ICDSST 2024, held in June…
2024. The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities. This year the main topic was: Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions. The 10 full papers included in these proceedings were carefully reviewed and selected from 29 submissions. They have been organized in topical sections as follows: Decision support tools and methods; and decision factors.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2038)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part IV (Communications in Computer and Information Science #2040)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Lucid Dreams in 30 Days: The Creative Sleep Program (In 30 Days)
By Keith Harary, Pamela Weintraub. 1989
With Lucid Dreams in 30 Days you will learn to explore the mysteries of your sleeping self. Beginning with simple…
steps such as keeping a dream journal to record your dreams, Keith Harary, Ph.D., and Pamela Weintraub take you step-by-step, day-by-day through the lucid dreaming process. You advance to realizing when you are in a dream state, waking up "in" your dreams, and eventually, actually controlling the content of your dreams.The Moon Book: Lunar Magic to Change Your Life
By Sarah Faith Gottesdiener. 2020
A guide to conscious living through the moon and her phases, incorporating wellness rituals, spellwork, and witchcraft for the modern…
seeker.We all know the moon. We all have a relationship with it. The earliest people obeyed her orbit, timed their months and holidays and celebrations and agriculture to the moon; the echoes of that system are still visible today, though the connection to the moon is often forgotten.Sarah Faith Gottesdiener is the leader of a movement to remind us of that lineage, guiding our rhythms and our sleep, our energy and our emotions, reminding us of our humanity and our magic. In her self-published Many Moons Workbooks and Lunar Journals, as well as her sold-out classes, she has guided over 50,000 readers to a deeper relationship with the moon, and through it, with themselves.This evergreen book will be an informative and comprehensive guide to lunar living, incorporating radical, self-empowering, and magical tools and resources for the beginner and experienced lunar-follower alike. Depending on where we are in our lives, depending on what we are feeling or what is happening around us, the moon allows us a space to invite ritual into our daily lives. The Moon Book will provide a framework on how to utilize the entire lunar cycle holistically, while offering ways for the reader to develop a personal relationship with their own cycles—energetic, personal, and emotional—through the lens of the moon’s phases.Dive deep into Kotlin design patterns, explore idiomatic functional programming, and master microservices with frameworks like Arrow, Ktor, and Vert.x.Key…
FeaturesStart from basic Kotlin syntax and go all the way to advanced topics like Coroutines and structural concurrencyLearn how to select and implement the right design pattern for your next Kotlin projectGet to grips with concurrent and reactive microservices with Ktor and Vert.xBook DescriptionFor developers who are working with design patterns in Kotlin, this practical guide offers an opportunity to put their knowledge into practice. The book covers classical and modern design patterns, and provides a hands-on approach to implementation, along with associated methodologies. The third edition stays current with Kotlin updates, spanning from version 1.6 onwards, and offers in-depth insights into topics like structured concurrency and context receivers. The book starts by introducing essential Kotlin syntax and the significance of design patterns, covering classic Creational, Structural, and Behavioral patterns. It then progresses to explore functional programming, Reactive, and Concurrent patterns, including detailed discussions on coroutines and structured concurrency. As you navigate through these advanced concepts, you'll enhance your Kotlin coding skills. The book also delves into the latest architectural trends, focusing on microservices design patterns and aiding your decision-making process when choosing between architectures. By the end of the book, you will have a solid grasp of these advanced concepts and be able to apply them in your own projects.What you will learnUtilize functional programming and coroutines with the Arrow frameworkUse classical design patterns in the Kotlin programming languageScale your applications with reactive and concurrent design patternsDiscover best practices in Kotlin and explore its new featuresApply the key principles of functional programming to KotlinFind out how to write idiomatic Kotlin code and learn which patterns to avoidHarness the power of Kotlin to design concurrent and reliable systems with easeCreate an effective microservice with Kotlin and the Ktor frameworkWho this book is forThis book is for developers who want to apply design patterns they've learned from other languages in Kotlin and build reliable, scalable, and maintainable applications. You'll need a good grasp on at least one programming language before you get started with this book. Familiarity with classical design patterns from your language of choice would be helpful, but you'll still be able to follow along if you code in other languagesSimply because no two brides (or astrological signs) are ever the same. . . .Congratulations, bride-to-be! You're newly engaged, you've…
flashed your ring to all your neighbors, and you've called all your friends and family with the exciting news—so what do you do next? Read your horoscope, of course! You've been following the stars ever since you can remember, and now you can use astrology as a tool to plan the biggest day of your life! Never Throw Rice at a Pisces helps you use the powers of your astrological sign to make your wedding relaxed, romantic, and magically memorable. Astrologer Stacey Wolf gives smart, easy-to-use sign-specific advice on topics such as:• Vows to inspire a Scorpio bride and Cancer groom• How to talk a headstrong Aries groom into just about anything• The perfect cake for a whimsical Gemini bride• A heavenly honeymoon for an Aquarius/Libra couple• What a Sagittarius bride should avoid for a stress-free weddingPeppered with fun sidebars, stories from other astrobrides, and quick tips based on the twelve zodiac signs to solve last-minute dilemmas, Never Throw Rice at a Pisces will help you plan the perfect wedding and honeymoon you were born to have!How to Spot a Bastard by His Star Sign: The Ultimate Horrorscope
By Adèle Lang, Susi Rajah. 2002
The Ultimate HorrorscopeJoin the women around the world whose love lives have been transformed by the astro-guide that pulls no…
punches when it comes to the dark side of men and their star signs.Use it to... -Deride, ridicule, and annoy the hell out of men - Speed up the dating process by using star sign elimination - Avoid dating complete scum - Keep current boyfriends/husbands in their places - Keep conversation going at dinner parties - And much, much more!Discover who you are destined not to date...A match made in heaven or the relationship from hell? Find out which zodiac couplings are the least likely to result in derision, depression, divorce, or death! - Are you good enough for a LEO? - Can you put up with PISCES? - Will you get along with GEMINI? - Do you have the skills necessary to cope with VIRGO? Put yourself to the test with our 12 compatibility quizzes - each one carefully designed to ensure you know exactly which bastards to avoid in the future.Now men will cringe when you ask them what their star signs are!AQA A level Computer Science
By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.