Title search results
Showing 1 - 20 of 50504 items
Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
By Madhusudhan H. S., Satish Kumar T., Punit Gupta, Dinesh Kumar Saini, Kashif Zia. 2024
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations…
that local devices are unable to handle. The computing power and flexibility that have made the cloud so popular do not come without challenges. It is particularly challenging to decide which resources to use, even when they have the same configuration but different levels of performance because of the variable structure of the available resources. Cloud data centers can host millions of virtual machines, and where to locate these machines in the cloud is a difficult problem. Additionally, fulfilling optimization needs is a complex problem.Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques. It also looks at virtual machine placement techniques that can improve quality-of-service (QoS) in service-oriented architecture (SOA) computing. The aims of virtual machine placement include minimizing energy usage, network traffic, economical cost, maximizing performance, and maximizing resource utilization. Other highlights of the book include: Improving QoS and resource efficiency Fault-tolerant and reliable resource optimization models A reactive fault tolerance method using checkpointing restart Cost and network-aware metaheuristics. Virtual machine scheduling and placement Electricity consumption in cloud data centers Written by leading experts and researchers, this book provides insights and techniques to those dedicated to improving cloud computing and its services.Game Design Deep Dive: Soulslike
By Joshua Bycer. 2024
Game Design Critic Joshua Bycer is back with another entry in the Game Design Deep Series to focus on the…
youngest genre yet: soulslikes. Over a decade, From Software defined a new genre that has led to studios chasing after them hit after hit. In this book, Josh will cover the history of the genre and popular soulslike games of the 2010s and discuss what aspects of design make a game a soulslike. The first book looking at the history of the genre A breakdown of both action and RPG design for fans and designers of both A lesson on difficulty in games and why harder doesn’t mean betterThe third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on…
the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a modern, 21st-century Linux system, such as the Raspberry Pi OS, is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. This third volume includes a beginner’s compendium of essential text-based Linux commands, a complete tutorial on the most important Raspberry Pi OS Text Editors, a description of uses of the git command, and a thorough explication of container virtualization with LXC/LXD and Docker.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volume can also be adopted in a more formal learning environment to supplement and extend the basic knowledge of a Linux operating system.The Zero Trust Framework and Privileged Access Management (PAM)
By Ravindra Das. 2024
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business…
is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion
By Ashley Firth. 2024
Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population,…
or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #194)
By Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Limits of AI - theoretical, practical, ethical (Technik im Fokus)
By Klaus Mainzer, Reinhard Kahle. 2024
Artificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the…
perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2037)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part III (Communications in Computer and Information Science #2039)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Decision Support Systems XIV. Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions: 10th International Conference on Decision Support System Technology, ICDSST 2024, Porto, Portugal, June 3–5, 2024, Proceedings
By Sérgio Pedro Duarte, António Lobo, Boris Delibašić, Daouda Kamissoko. 2024
This book constitutes the proceedings of the 10th International Conference on Decision Support Systems Technologies, ICDSST 2024, held in June…
2024. The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities. This year the main topic was: Human-Centric Group Decision, Negotiation and Decision Support Systems for Societal Transitions. The 10 full papers included in these proceedings were carefully reviewed and selected from 29 submissions. They have been organized in topical sections as follows: Decision support tools and methods; and decision factors.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2038)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.Advancements in Smart Computing and Information Security: Second International Conference, ASCIS 2023, Rajkot, India, December 7–9, 2023, Revised Selected Papers, Part IV (Communications in Computer and Information Science #2040)
By Sridaran Rajagopal, Kalpesh Popat, Divyakant Meva, Sunil Bajeja. 2024
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information…
Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023. The 91 full papers and 36 short papers in the volume were carefully checked and selected from 432 submissions. Various application areas were presented at the conference, including healthcare, agriculture, automotive, construction and engineering, pharmaceuticals, cybercrime and sports.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Dive deep into Kotlin design patterns, explore idiomatic functional programming, and master microservices with frameworks like Arrow, Ktor, and Vert.x.Key…
FeaturesStart from basic Kotlin syntax and go all the way to advanced topics like Coroutines and structural concurrencyLearn how to select and implement the right design pattern for your next Kotlin projectGet to grips with concurrent and reactive microservices with Ktor and Vert.xBook DescriptionFor developers who are working with design patterns in Kotlin, this practical guide offers an opportunity to put their knowledge into practice. The book covers classical and modern design patterns, and provides a hands-on approach to implementation, along with associated methodologies. The third edition stays current with Kotlin updates, spanning from version 1.6 onwards, and offers in-depth insights into topics like structured concurrency and context receivers. The book starts by introducing essential Kotlin syntax and the significance of design patterns, covering classic Creational, Structural, and Behavioral patterns. It then progresses to explore functional programming, Reactive, and Concurrent patterns, including detailed discussions on coroutines and structured concurrency. As you navigate through these advanced concepts, you'll enhance your Kotlin coding skills. The book also delves into the latest architectural trends, focusing on microservices design patterns and aiding your decision-making process when choosing between architectures. By the end of the book, you will have a solid grasp of these advanced concepts and be able to apply them in your own projects.What you will learnUtilize functional programming and coroutines with the Arrow frameworkUse classical design patterns in the Kotlin programming languageScale your applications with reactive and concurrent design patternsDiscover best practices in Kotlin and explore its new featuresApply the key principles of functional programming to KotlinFind out how to write idiomatic Kotlin code and learn which patterns to avoidHarness the power of Kotlin to design concurrent and reliable systems with easeCreate an effective microservice with Kotlin and the Ktor frameworkWho this book is forThis book is for developers who want to apply design patterns they've learned from other languages in Kotlin and build reliable, scalable, and maintainable applications. You'll need a good grasp on at least one programming language before you get started with this book. Familiarity with classical design patterns from your language of choice would be helpful, but you'll still be able to follow along if you code in other languagesMad Women: The Other Side of Life on Madison Avenue in the '60s and Beyond
By Jane Maas. 2012
"Breezy and salty." -The New York Times"Hilarious! Honest, intimate, this book tells it as it was." -Mary Wells Lawrence, author…
of A Big Life (In Advertising) and founding president of Wells Rich Greene "Breezy and engaging [though] ...The chief value of Mad Women is the witness it bears for younger women about the snobbery and sexism their mothers and grandmothers endured as the price of entry into mid-century American professional life." -The Boston Globe"A real-life Peggy Olson, right out of Mad Men." -Shelly Lazarus, Chairman, Ogilvy & MatherWhat was it like to be an advertising woman on Madison Avenue in the 60s and 70s - that Mad Men era of casual sex and professional serfdom? A real-life Peggy Olson reveals it all in this immensely entertaining and bittersweet memoir.Mad Women is a tell-all account of life in the New York advertising world by Jane Maas, a copywriter who succeeded in the primarily male jungle depicted in the hit show Mad Men. Fans of the show are dying to know how accurate it is: was there really that much sex at the office? Were there really three-martini lunches? Were women really second-class citizens? Jane Maas says the answer to all three questions is unequivocally "yes." Her book, based on her own experiences and countless interviews with her peers, gives the full stories, from the junior account man whose wife almost left him when she found the copy of Screw magazine he'd used to find "a date" for a client, to the Ogilvy & Mather's annual Boat Ride, a sex-and-booze filled orgy, from which it was said no virgin ever returned intact. Wickedly funny and full of juicy inside information, Mad Women also tackles some of the tougher issues of the era, such as unequal pay, rampant, jaw-dropping sexism, and the difficult choice many women faced between motherhood and their careers.AQA A level Computer Science
By Bob Reeves. 2015
Exam Board: AQALevel: AS/A-levelSubject: Computer ScienceFirst Teaching: September 2015First Exam: June 2016This title has been approved by AQA for use…
with the AS and A-level AQA Computer Science specifications. AQA A-level Computer Science gives students the chance to think creatively and progress through the AQA AS and A-level Computer Science specifications. Detailed coverage of the specifications will enrich understanding of the fundamental principles of computing, whilst a range of activities help to develop the programming skills and computational thinking skills at A-level and beyond. - Enables students to build a thorough understanding of the fundamental principles in the AQA AS and A-Level Computer Science specifications, with detailed coverage of programming, algorithms, data structures and representation, systems, databases and networks, uses and consequences.- Helps to tackle the various demands of the course confidently, with advice and support for programming and theoretical assessments and the problem-solving or investigative project at A-level.- Develops the programming and computational thinking skills for A-level and beyond - frequent coding and question practice will help students apply their knowledge of the principles of computer science, and design, program and evaluate problem-solving computer systems. Bob Reeves is an experienced teacher with examining experience, and well-respected author of resources for Computing and ICT across the curriculum.Data Management: Der Weg zum datengetriebenen Unternehmen
By Klaus-Dieter Gronwald. 2024
Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles…
Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.Fourth Congress on Intelligent Systems: CIS 2023, Volume 2 (Lecture Notes in Networks and Systems #869)
By Sandeep Kumar, K. Balachandran, Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by…
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)
By Nur Syazreen Ahmad, Junita Mohamad-Saleh, Jiashen Teh. 2024
This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing,…
and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.