Title search results
Showing 1 - 20 of 64759 items
Work Remotely (Penguin Business Experts Series)
By Anastasia Tohmé, Martin Worner. 2021
Remote working makes us happier, more productive and more profitable, but it can bring its own set of challenges. How…
do we manage our work-life balance; communicate and collaborate effectively as teams; and ensure our technology is efficient?In Work Remotely, Penguin Business Experts Anastasia Tohmé and Martin Worner explain everything you need to know:- Set your own targets and monitor productivity- Establish boundaries between working hours and free time- Manage effective communication and decision-making at a distanceIncluding case studies from the companies around the world who are innovating and revolutionizing the way we work, Work Remotely shares useful advice and practical tips to ensure you get the most out of working away from the office environment.Unlawful Killings: Life, Love and Murder: Trials at the Old Bailey - The instant Sunday Times bestseller
By Her Honour Wendy Joseph. 2022
THE INSTANT SUNDAY TIMES BESTSELLERWINNER OF THE CWA GOLD DAGGER FOR NON-FICTION 2023'Wendy Joseph's gripping account of the law at…
work reads like a cliffhanger.' Sunday Times'Absolutely superb. 5 stars for sheer readability alone. Her Honour entertains as she educates us about murder, about the law and about how we human beings are shaped as we create the culture we live with.' PHILIPPA PERRY, author of THE BOOK YOU WISH YOUR PARENTS HAD READ___________________________________________________________________________________'Every day in the UK lives are suddenly, brutally, wickedly taken away. Victims are shot or stabbed. Less often they are strangled or suffocated or beaten to death. Rarely they are poisoned, pushed off high buildings, drowned or set alight. Then there are the many who are killed by dangerous drivers, or corporate gross negligence. There are a lot of ways you can kill someone. I know because I've seen most of them at close quarters.'High-profile murder cases all too often grab our attention in dramatic media headlines - for every unlawful death tells a story. But, unlike most of us, a judge doesn't get to turn the page and move on. Nor does the defendant, or the family of the victim, nor the many other people who populate the court room.And yet, each of us has a vested interest in what happens there. And while most people have only the sketchiest idea of what happens inside a Crown Court, any one of us could end up in the witness-box or even in the dock.With breath-taking skill and deep compassion, the author describes how cases unfold and illustrates exactly what it's like to be a murder trial judge and a witness to human good and bad. Sometimes very bad.The fracture lines that run through our society are becoming harder and harder to ignore. From a unique vantage point, the author warns that we do so at our peril._____________________________________________________________________________________________'The most exceptional book I have read in a long time.' CLARE MACKINTOSH'A very rare gem. written with authority, humility and compassion. Compellingly clever and sharply honest.' PROFESSOR DAME SUE BLACK, author of ALL THAT REMAINS'Riveting, thought-provoking, and very, very entertaining. I loved it.' RODDY DOYLE'Will make you question all the fundamentals that you've come to take for granted about offenders, the crimes that they commit - especially murder - and the punishment they deserve. A page turner that will leave you wanting to know more.' EMERITUS PROFESSOR DAVID WILSON, author of MY LIFE WITH MURDERERSThe instant Sunday Times bestseller, March 2023Two Children Behind A Wall
By Catherine Laylle. 2011
In 1984, Catherine Laylle, a Frenchwomen living in London, met and married a German medical student, Dieter. The couple had…
two sons, Alexander and Constantin. When, however, at Dieter's insistence, they moved back to his home town in Germany, the marriage began to fall apart. Dieter refused to get a job, Catherine found living with his family oppressive and eventually, she returned to London with the children. The boys spent term time with their mother, holidays with their father - until the summer of 1994, when Dieter decided that his sons should be raised as Germans and, with the support of the local judge, defied the London court ruling that gave Catherine custody. Catherine went to the courts in London, Germany and the Hague - but it seemed that no court outside the jurisdiction of Lower Saxony would overrule the decision. Today, Alexander is eleven and Constantin is nine. Catherine has barely seen them in the two years since Dieter kidnapped them - and then only under the supervision of one of his friends. This is the harrowing story of a mother's attempts to regain her children, and of her desperate struggle against a tyrannical family and the blind injustice of the courts in Europe.The Trust Manifesto: What you Need to do to Create a Better Internet
By Damian Bradfield. 2019
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to…
the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data. But do we care? We're busy. We've got lives. We're pressed for time! There aren't enough hours in the day to read the terms and conditions. Or, maybe we're happy to trade our personal data for convenient services and to make our lives easier?Big data is the phenomenon of our age, but should we trust it without question? This is the trust dilemma.In 2009, Damian Bradfield founded WeTransfer, the largest file-sharing platform in the world with 50 million global users shipping more than one billion files of data a month. His unique experience of the big data economy has led him to question if there is another way to build the internet, one that is fairer and safer for everyone and, in The Trust Manifesto, he lays out this vision.Imperfect Justice: Prosecuting Casey Anthony
By Jeff Ashton, Lisa Pulitzer. 2012
The definitive inside story of the case that captivated the nation. . . and the verdict that no one saw…
coming.It was the trial that stunned America. On July 5, 2011, nearly three years after her initial arrest, Casey Anthony walked away, virtually scot-free, from one of the most sensational murder trials of all time. She'd been accused of killing her daughter, Caylee, but the trial only left behind more questions: Was she actually innocent? What really happened to Caylee? Was this what justice really looked like?In Imperfect Justice, prosecutor Jeff Ashton, one of the principal players in the case's drama, sheds light on those questions and much more, telling the behind-the-scenes story of the investigation, the trial, and the now-infamous verdict. Complete with never-before-revealed information about the case and the accused, Ashton examines what the prosecution got right, what they got wrong, and why he remains completely convinced of Casey Anthony's guilt.Civil Rights: Rhetoric or Reality
By Thomas Sowell. 1984
It is now more than three decades since the historic Supreme Court decision on desegregation, Brown v. Board of Education.…
Thomas Sowell takes a tough, factual look at what has actually happened over these decades -- as distinguished from the hopes with which they began or the rhetoric with which they continue, Who has gained and who has lost? Which of the assumptions behind the civil rights revolution have stood the test of time and which have proven to be mistaken or even catastrophic to those who were supposed to be helped?From Concepts to Code: Introduction to Data Science
By Adam P. Tashman. 2024
The breadth of problems that can be solved with data science is astonishing, and this book provides the required tools…
and skills fot a broad audience. The reader takes a journey into the forms, uses, and abuses of data and models, and learns how to critically examine each step. Python coding and data analysis skills are built from the ground up, with no prior coding experience assumed. The necessary background in computer science, mathematics, and statistics is provided in an approachable manner.Each step of the machine learning lifecycle is discussed, from business objective planning to monitoring a model in production. This end-to-end approach supplies the broad view necessary to sidestep many of the pitfalls that can sink a data science project. Detailed examples are provided from a wide range of applications and fields, from fraud detection in banking to breast cancer classification in healthcare. The reader will learn the techniques to accomplish tasks that include predicting outcomes, explaining observations, and detecting patterns. Improper use of data and models can introduce unwanted effects and dangers to society. A chapter on model risk provides a framework for comprehensively challenging a model and mitigating weaknesses. When data is collected, stored, and used, it may misrepresent reality and introduce bias. Strategies for addressing bias are discussed. From Concepts to Code: Introduction to Data Science leverages content developed by the author for a full-year data science course suitable for advanced high school or early undergraduate students. This course is freely available and it includes weekly lesson plans.Threat Modeling: Designing for Security
By Adam Shostack. 2014
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies…
and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.Cyber War: The Next Threat to National Security and What to Do About It
By Richard A. Clarke, Robert K. Knake. 2010
An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security. “Cyber War may…
be the most important book about national security policy in the last several years.” –SlateFormer presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals.Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security.Entdecken Sie "Enterprise Architektur entschlüsselt: Ein praxisorientierter Leitfaden von den Grundlagen bis zur Anwendung“ von Dennis Suhari, ein praxisorientiertes Werk,…
das die Förderung des Bewusstseins für Enterprise Architektur, die Vermittlung praktischer Erfahrungen und die Unterstützung der Leser bei der erfolgreichen Anwendung ihres Wissens in den Mittelpunkt stellt. Ein Schlüsselelement dieses Buches ist das praxisnahe Fallbeispiel, das einen einzigartigen Einblick in den Aufbau einer Enterprise Architektur von der Geschäfts- über die IT Architektur von Grund auf bietet.Was Sie erwartet:Fundamentale Grundlagen: Ein tiefgreifender Einblick in die essenziellen Grundlagen der Unternehmensarchitektur, um Schlüsselkonzepte und Prinzipien zu vermitteln, die als robuste Basis für die weitere Entwicklung dienen.Modellierung und praktische Tools: Entdecken Sie vielfältige Modellierungsmöglichkeiten und EAM-Tools, die inder Praxis zur Unterstützung der Architekturentwicklung eingesetzt werden.Architekturentwicklung in der Praxis: Anhand des Fallbeispiels der fiktiven Micayu GmbH, basierend auf den umfangreichen Erfahrungen des Autors, erleben Sie die Schritte der Entwicklung einer Unternehmensarchitektur von Grund auf.Zukunftsperspektiven: Ein Ausblick auf die Rolle der Künstlichen Intelligenz und dessen Einfluss auf das Enterprise Architektur ManagementArtificial Intelligence Governance and the Blockchain Revolution (Artificial Intelligence and the Rule of Law)
By Qiqi Gao, Jiteng Zhang. 2024
This is the first professional academic work in China to discuss artificial intelligence and blockchain together. Artificial intelligence is a…
productivity revolution, and its development has a significant and profound impact on global changes. However, at the same time, its development also brings a series of challenges to human society, such as privacy, security, and fairness issues. Therefore, the significance of blockchain is even more prominent. Blockchain is a revolution in production relations, which will propose important solutions to the challenges of privacy, security, and fairness that arise after the development of artificial intelligence. The book not only discusses the problems currently faced by the development of artificial intelligence, as well as the new opportunities and challenges that artificial intelligence brings to future global governance, but also explains the further development direction of the intelligent revolution from the perspective of blockchain.Innovations in Smart Cities Applications Volume 7: The Proceedings of the 8th International Conference on Smart City Applications, Volume 2 (Lecture Notes in Networks and Systems #938)
By Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir, Rani El Meouche, İsmail Rakıp Karaș. 2024
Many cities in the developed world are undergoing a digital revolution, and have placed the "smart city" on their list…
of priorities. Smart cities use technological solutions such as Internet of Things, AI, 5G, Big Data, Cloud computing, Smart Grid, as well as all the emerging technologies of the digital era, to improve the management and efficiency of the urban environment. The aim is to make residents happier, healthier, smarter and more prosperous, and to make the city greener, cleaner, more sustainable, more responsible, more functional, more resilient, and more competitive. Enhanced by extensive research studies and carried out under the guidance of international scientific experts in the field. This book explores various papers related to smart cities, including digital twins, geo-smart information systems, education, healthcare, economy and digital business, building and home automation, environment and agriculture, and information technologies and computer science.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14646)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14645)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.This proceedings presents papers from the Second International Adaptive and Sustainable Science, Engineering and Technology Conference (ASSET 2023), which took place…
simultaneously in Manchester, UK and Ikot Akpaden, Nigeria on 18-20, July 2023. The ASSET conference serves as an interactive forum for the advancement of the practice of adaptive and sustainable systems across the multiple disciplines and specialty areas involved with the science, engineering, and technology of integrated entities, complex systems, and networks. The conference provides an avenue for practitioners, researchers, managers, developers, analysts, educators, and users to exchange innovative ideas, concepts, applications, and lessons learned in addressing domain-specific problems, applications-oriented topics, methodologies, standards and multidisciplinary research opportunities and findings relating to ASSET systems.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14647)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.Proceedings of the 2nd International Conference on Big Data, IoT and Machine Learning: BIM 2023 (Lecture Notes in Networks and Systems #867)
By Mohammad Shamsul Arefin, M. Shamim Kaiser, Touhid Bhuiyan, Nilanjan Dey, Mufti Mahmud. 2024
This book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Big Data, IoT and…
Machine Learning (BIM 2023), organised by Jahangirnagar University, Bangladesh, and Daffodil International University, Bangladesh, held in Dhaka, Bangladesh, during 6–8 September 2023. The book covers research papers in the field of big data, IoT and machine learning. The book is helpful for active researchers and practitioners in the field.This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermarking, IWDW 2023, held…
in Jinan, China, during November 25–26, 2023. The 22 full papers included in this book were carefully reviewed and selected from 48 submissions. The workshop focuses on subjects such as novel research, development and application of digital watermarking, data hiding, and forensic techniques for multimedia security.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part VI (Lecture Notes in Computer Science #14650)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part V (Lecture Notes in Computer Science #14649)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.