Service Alert
Delay in delivery of ZIP and Direct to Player materials
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
You may experience a delay in delivery of Direct to Player materials. All requests for materials will be delivered as soon as possible. Thank you for your patience.
Showing 1 - 20 of 67165 items
By Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.Originally published in 1969, at a time when there was an ever-increasing number of people going to the coast and…
countryside at weekends and on holiday, this book filled a gap by providing detail on the physical results of all that needed to be done for the leisure-seeking public. It discusses juggling the needs of the public whilst maintaining the quality of the natural environment – a balancing act which remains as relevant in the 21st Century as when the book was first published. The book is intended for all those making provision for public recreation and countryside protection. The passing of the Countryside Act in 1968 in the UK necessitated detailed work for local authorities: the design and siting of car parks; public lavatories; litter bins, camp and picnic sites; swimming pools and information centres to name but a few. Elisabeth Beazley discusses the principles involved and illustrates successful and cautionary examples from both sides of the Atlantic as well as Continental EuropeThe Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.By Jason Morgan, Flynn. 2024
With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can…
help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how the Linkerd service mesh enables cloud-native developers—including platform and site reliability engineers—to solve the thorny issue of running distributed applications in Kubernetes.Jason Morgan and Flynn draw on their years of experience at Buoyant—the creators of Linkerd—to demonstrate how this service mesh can help ensure that your applications are secure, observable, and reliable. You'll understand why Linkerd, the original service mesh, can still claim the lowest time to value of any mesh option available today.Learn how Linkerd works and which tasks it can help you accomplishInstall and configure Linkerd in an imperative and declarative mannerSecure interservice traffic and set up secure multicluster linksLaunch a zero trust authorization strategy in Kubernetes clustersOrganize services in Linkerd to override error codes, set custom retries, and create timeoutsUse Linkerd to manage progressive delivery and pair this service mesh with the ingress of your choiceBy Angel Au-Yeung, David Jeans. 2023
A Financial Times best business book of 2023In 1998, at the age of 24, Tony Hsieh sold his first company…
to Microsoft for $265 million.In 2009, at the age of 35, he sold his e-commerce company, Zappos, to Amazon for $1.2 billion.In 2020, at the age of 46, he died.Tony Hsieh revolutionized both the tech world and corporate culture. He was a business visionary. He was also a man in search of happiness. So why did it all go so wrong?Tony Hsieh’s first successful venture was in middle school, selling personalized buttons. At Harvard, he made a profit compiling and selling study guides. From there, he went on to build the billion-dollar online shoe empire of Zappos.The secret to his success? Making his employees happy.At its peak, Zappos’s employee-friendly culture was so famous across the tech industry that it inspired copycats and earned a cult following. Then Hsieh moved the Zappos headquarters to Las Vegas, where he personally funded a nine-figure campaign to revitalize the city’s historic downtown area. But as Hsieh fell deeper into his struggles with mental health and drug addiction, the people making up his inner circle began changing from friends to enablers.Drawing on hundreds of interviews with a wide range of people whose lives Hsieh touched, journalists Angel Au-Yeung and David Jeans craft a rich portrait of a man who was plagued by his eternal search for happiness and ultimately succumbed to his own demons.By Kaushal Shah. 2024
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and…
the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security attacks by considering real-time applications based on IoT, Wireless Sensor Networks, Cyber-Physical Systems, and Smart Grids. The book is useful for academicians and research scholars worldwide working in cyber security. It is also useful for industry experts working in cyber security.Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.By Md Atiqur Rahman Ahad, Sozo Inoue, Guillaume Lopez, Tahera Hossain. 2024
Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on two main subject areas: Movement and Sensors, and Sports Activity Analysis.The editors are experts in these arenas, and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.By Peter Bludau, Rudolf Ramler, Dietmar Winkler, Johannes Bergsmann. 2024
This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2024, held in Vienna, Austria, during…
April 23-25, 2024. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conference on software quality in Europe. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2024 is “Software Quality as a Foundation for Security”. The 7 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The papers were organized in topical sections as follows: Requirements engineering; software quality; continuous integration and deployment; communication and collaboration; artificial intelligence; and security and compliance.By Ronda Rousey. 2024
From New York Times bestselling author and trailblazing athlete Ronda Rousey, an unfiltered chronicle of loss, resilience and finding meaning…
in life's journey. From the moment she burst onto the MMA scene, Ronda Rousey was unbeatable. She repeatedly strung together back-to-back flawless victories, racking up a collection of records and forever changing the face of sports as the UFC's first female champion. A superstar in her sport, she transcended athletics, appearing in blockbuster films and becoming a role model for women everywhere. Then, on November 15, 2015, it all came crashing down. In OUR FIGHT, Rousey explores the greatest challenge of her life and, ultimately, how she rebuilt her life into something better in the aftermath. She recounts how she replaced her pursuit of perfection with the pursuit of happiness and found an opportunity in disguise amongst the wreckage. Following Rousey's relatable journey, OUR FIGHT is a courageous narrative of career changes, marriage, motherhood, and facing your fearsThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they…
evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.By Tiratha Raj Singh, Hemraj Saini, Moacyr Comar Junior. 2024
Bioinformatics and Computational Biology: Technological Advancements, Applications and Opportunities is an invaluable resource for general and applied researchers who analyze…
biological data that is generated, at an unprecedented rate, at the global level. After careful evaluation of the requirements for current trends in bioinformatics and computational biology, it is anticipated that the book will provide an insightful resource to the academic and scientific community. Through a myriad of computational resources, algorithms, and methods, it equips readers with the confidence to both analyze biological data and estimate predictions.The book offers comprehensive coverage of the most essential and emerging topics: Cloud-based monitoring of bioinformatics multivariate data with cloud platforms Machine learning and deep learning in bioinformatics Quantum machine learning for biological applications Integrating machine learning strategies with multiomics to augment prognosis in chronic diseases Biomedical engineering Next generation sequencing techniques and applications Computational systems biology and molecular evolution While other books may touch on some of the same issues and nuances of biological data analysis, they neglect to feature bioinformatics and computational biology exclusively, and as exhaustively. This book's abundance of several subtopics related to almost all of the regulatory activities of biomolecules from where real data is being generated brings an added dimension.By Rostyslav Shchokin, Anna Iatsyshyn, Valeriia Kovach, Artur Zaporozhets. 2024
Among the technologies that significantly change the modern world of human existence, it is worth mentioning, first of all, digital…
technologies. These technologies are actively and relentlessly implemented and integrated into all spheres of human activity and society, becoming a powerful catalyst and a determining source of social development. According to such a scenario of development, society acquires the features of digital, thus defining digital technologies as its leading technology. This process is called the digital transformation of society. The wide use of digital technologies to provide free access to information and knowledge is a basic principle of the digital society. Digital society significantly changes traditional ideas about work, education, culture, communication, social and political life. The development of citizens' digital culture is the main condition for the successful construction of a digital society. Therefore, it is important to carry out scientific research and targeted training to improve the qualifications of specialists in various branches of the economy, in particular, educators and scientists to acquire digital competence. After all, these specialists are key figures in ensuring the process of digitalization of education and science. The book presents various aspects of the digital transformation of education and science. A comprehensive view of the current state and prospects of the use of digital technologies for education and science is provided. The experience of using digital technologies and tools for training and improving the qualifications of specialists of various specialties, as well as for the preparation of future PhDs, is described. The book is addressed to education workers, managers, scientists, graduate students, librarians, and all those who are interested in the process of digital transformation of education and science.This book constitutes the workshops that have been held in conjunction with the 27th Pacific-Asia Conference on Knowledge Discovery and…
Data Mining, PAKDD 2023, which took place in Osaka, Japan, during May 25–28, 2023. For RAFDA 2024, Workshop on Research and Applications of Foundation Models for Data Mining and Affective Computing, 15 submissions have been received and 9 full papers have been accepted for publication. For IWTA 2024, International Workshop on Temporal Analytics, 4 full papers have been accepted from a total of 6 submissions.By Jean Williams. 2023
This is the first academic history of the FA England women’s national football team. Based on unprecedented access to FA…
data, it details the careers of the 227 women who debuted for England from 1972 to 2022. England won the UEFA Women’s Euros in 2022, and Jean worked with Sarina Wiegman and the squad, on the Legendary Lionesses from 1972.Unlock the Power of Data: Transform Your Marketing Strategies with Data Science In the digital age, understanding the symbiosis between…
marketing and data science is not just an advantage; it's a necessity. In Mastering Marketing Data Science: A Comprehensive Guide for Today's Marketers, Dr. Iain Brown, a leading expert in data science and marketing analytics, offers a comprehensive journey through the cutting-edge methodologies and applications that are defining the future of marketing. This book bridges the gap between theoretical data science concepts and their practical applications in marketing, providing readers with the tools and insights needed to elevate their strategies in a data-driven world. Whether you're a master's student, a marketing professional, or a data scientist keen on applying your skills in a marketing context, this guide will empower you with a deep understanding of marketing data science principles and the competence to apply these principles effectively. Comprehensive Coverage: From data collection to predictive analytics, NLP, and beyond, explore every facet of marketing data science. Practical Applications: Engage with real-world examples, hands-on exercises in both Python & SAS, and actionable insights to apply in your marketing campaigns. Expert Guidance: Benefit from Dr. Iain Brown's decade of experience as he shares cutting-edge techniques and ethical considerations in marketing data science. Future-Ready Skills: Learn about the latest advancements, including generative AI, to stay ahead in the rapidly evolving marketing landscape. Accessible Learning: Tailored for both beginners and seasoned professionals, this book ensures a smooth learning curve with a clear, engaging narrative. Mastering Marketing Data Science is designed as a comprehensive how-to guide, weaving together theory and practice to offer a dynamic, workbook-style learning experience. Dr. Brown's voice and expertise guide you through the complexities of marketing data science, making sophisticated concepts accessible and actionable.Design, build, and secure scalable machine learning (ML) systems to solve real-world business problems with Python and AWS Purchase of…
the print or Kindle book includes a free PDF eBookKey FeaturesGo in-depth into the ML lifecycle, from ideation and data management to deployment and scalingApply risk management techniques in the ML lifecycle and design architectural patterns for various ML platforms and solutionsUnderstand the generative AI lifecycle, its core technologies, and implementation risksBook DescriptionDavid Ping, Head of GenAI and ML Solution Architecture for global industries at AWS, provides expert insights and practical examples to help you become a proficient ML solutions architect, linking technical architecture to business-related skills. You'll learn about ML algorithms, cloud infrastructure, system design, MLOps , and how to apply ML to solve real-world business problems. David explains the generative AI project lifecycle and examines Retrieval Augmented Generation (RAG), an effective architecture pattern for generative AI applications. You’ll also learn about open-source technologies, such as Kubernetes/Kubeflow, for building a data science environment and ML pipelines before building an enterprise ML architecture using AWS. As well as ML risk management and the different stages of AI/ML adoption, the biggest new addition to the handbook is the deep exploration of generative AI. By the end of this book , you’ll have gained a comprehensive understanding of AI/ML across all key aspects, including business use cases, data science, real-world solution architecture, risk management, and governance. You’ll possess the skills to design and construct ML solutions that effectively cater to common use cases and follow established ML architecture patterns, enabling you to excel as a true professional in the field.What you will learnApply ML methodologies to solve business problems across industriesDesign a practical enterprise ML platform architectureGain an understanding of AI risk management frameworks and techniquesBuild an end-to-end data management architecture using AWSTrain large-scale ML models and optimize model inference latencyCreate a business application using artificial intelligence services and custom modelsDive into generative AI with use cases, architecture patterns, and RAGWho this book is forThis book is for solutions architects working on ML projects, ML engineers transitioning to ML solution architect roles, and MLOps engineers. Additionally, data scientists and analysts who want to enhance their practical knowledge of ML systems engineering, as well as AI/ML product managers and risk officers who want to gain an understanding of ML solutions and AI risk management, will also find this book useful. A basic knowledge of Python, AWS, linear algebra, probability, and cloud infrastructure is required before you get started with this handbook.