Service Alert
Delay in delivery of CDs
We are currently experiencing a delay with CD production. CDs are being sent and will be delivered as soon as possible. We apologize for the inconvenience.
We are currently experiencing a delay with CD production. CDs are being sent and will be delivered as soon as possible. We apologize for the inconvenience.
Showing 1 - 20 of 55649 items
Unlock the core math and understand the technical nuances of quantum computing in this detailed guide. Delve into the practicality…
of NISQ algorithms, and survey promising advancements in quantum machine learning.Key FeaturesDiscover how quantum computing works and delve into the math behind it with practical examplesLearn about and assess the most up-to-date quantum computing topics including quantum machine learningExplore the inner workings of existing quantum computing technologies to understand how they may perform significantly better than their classical counterpartsBook DescriptionDancing with Qubits, Second Edition, is a comprehensive quantum computing textbook that starts with an overview of why quantum computing is so different from classical computing and describes several industry use cases where it can have a major impact. A full description of classical computing and the mathematical underpinnings of quantum computing follows, helping you better understand concepts such as superposition, entanglement, and interference. Next up are circuits and algorithms, both basic and sophisticated, as well as a survey of the physics and engineering ideas behind how quantum computing hardware is built. Finally, the book looks to the future and gives you guidance on understanding how further developments may affect you. This new edition is updated throughout with more than 100 new exercises and includes new chapters on NISQ algorithms and quantum machine learning. Understanding quantum computing requires a lot of math, and this book doesn't shy away from the necessary math concepts you'll need. Each topic is explained thoroughly and with helpful examples, leaving you with a solid foundation of knowledge in quantum computing that will help you pursue and leverage quantum-led technologies.What you will learnExplore the mathematical foundations of quantum computingDiscover the complex, mind-bending concepts that underpin quantum systemsUnderstand the key ideas behind classical and quantum computingRefresh and extend your grasp of essential mathematics, computing, and quantum theoryExamine a detailed overview of qubits and quantum circuitsDive into quantum algorithms such as Grover’s search, Deutsch-Jozsa, Simon’s, and Shor’sExplore the main applications of quantum computing in the fields of scientific computing, AI, and elsewhereWho this book is forDancing with Qubits, Second Edition, is a quantum computing textbook for all those who want to understand and explore the inner workings of quantum computing. This entails building up from basic to some sophisticated mathematics and is therefore best suited for those with a healthy interest in mathematics, physics, engineering, or computer science.By Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela. 2024
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime,…
and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning. The text clearly explains theoretical aspects, framework, system architecture, analysis and design, implementation, validation, and tools and techniques of data science and machine learning to detect and prevent cyber threats. Using AI and ML approaches, the book offers strategic defense mechanisms for addressing malware, cybercrime, and system vulnerabilities. It also provides tools and techniques that can be applied by professional analysts to safely analyze, debug, and disassemble any malicious software they encounter. With contributions from qualified authors with significant experience in the field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection explores topics such as: Cybersecurity tools originating from computational statistics literature and pure mathematics, such as nonparametric probability density estimation, graph-based manifold learning, and topological data analysisApplications of AI to penetration testing, malware, data privacy, intrusion detection system (IDS), and social engineeringHow AI automation addresses various security challenges in daily workflows and how to perform automated analyses to proactively mitigate threatsOffensive technologies grouped together and analyzed at a higher level from both an offensive and defensive standpoint Providing detailed coverage of a rapidly expanding field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is an essential resource for a wide variety of researchers, scientists, and professionals involved in fields that intersect with cybersecurity, artificial intelligence, and machine learning.By Jill Abramson. 2015
Former executive editor of The New York Times and one of our most eminent journalists Jill Abramson provides a &“valuable…
and insightful&” (The Boston Globe) report on the disruption of the news media over the last decade, as shown via two legacy (The New York Times and The Washington Post) and two upstart (BuzzFeed and VICE) companies as they plow through a revolution that pits old vs. new media.&“A marvelous book&” (TheNew York Times Book Review), Merchants of Truth is the groundbreaking and gripping story of the precarious state of the news business.The new digital reality nearly kills two venerable newspapers with an aging readership while creating two media behemoths with a ballooning and fickle audience of millennials. &“Abramson provides this deeply reported insider account of an industry fighting for survival. With a keen eye for detail and a willingness to interrogate her own profession, Abramson takes readers into the newsrooms and boardrooms of the legacy newspapers and the digital upstarts that seek to challenge their dominance&” (Vanity Fair). We get to know the defenders of the legacy presses as well as the outsized characters who are creating the new speed-driven media competitors. The players include Jeff Bezos and Marty Baron (TheWashington Post), Arthur Sulzberger and Dean Baquet (TheNew York Times), Jonah Peretti (BuzzFeed), and Shane Smith (VICE) as well as their reporters and anxious readers.Merchants of Truth raises crucial questions that concern the well-being of our society. We are facing a crisis in trust that threatens the free press. &“One of the best takes yet on journalism&’s changing fortunes&” (Publishers Weekly, starred review), Abramson&’s book points us to the future.By George Gilder. 2000
The computer age is over. After a cataclysmic global run of thirty years, it has given birth to the age…
of the telecosm -- the world enabled and defined by new communications technology. Chips and software will continue to make great contributions to our lives, but the action is elsewhere. To seek the key to great wealth and to understand the bewildering ways that high tech is restructuring our lives, look not to chip speed but to communication power, or bandwidth. Bandwidth is exploding, and its abundance is the most important social and economic fact of our time. George Gilder is one of the great technological visionaries, and "the man who put the 's' in 'telecosm'" (Telephony magazine). He is equally famous for understanding and predicting the nuts and bolts of complex technologies, and for putting it all together in a soaring view of why things change, and what it means for our daily lives. His track record of futurist predictions is one of the best, often proving to be right even when initially opposed by mighty corporations and governments. He foresaw the power of fiber and wireless optics, the decline of the telephone regime, and the explosion of handheld computers, among many trends. His list of favored companies outpaced even the soaring Nasdaq in 1999 by more than double. His long-awaited Telecosm is a bible of the new age of communications. Equal parts science story, business history, social analysis, and prediction, it is the one book you need to make sense of the titanic changes underway in our lives. Whether you surf the net constantly or not at all, whether you live on your cell phone or hate it for its invasion of private life, you need this book. It has been less than two decades since the introduction of the IBM personal computer, and yet the enormous changes wrought in our lives by the computer will pale beside the changes of the telecosm. Gilder explains why computers will "empty out," with their components migrating to the net; why hundreds of low-flying satellites will enable hand-held computers and communicators to become ubiquitous; why television will die; why newspapers and magazines will revive; why advertising will become less obnoxious; and why companies will never be able to waste your time again. Along the way you will meet the movers and shakers who have made the telecosm possible. From Charles Townes and Gordon Gould, who invented the laser, to the story of JDS Uniphase, "the Intel of the Telecosm," to the birthing of fiberless optics pioneer TeraBeam, here are the inventors and entrepreneurs who will be hailed as the next Edison or Gates. From hardware to software to chips to storage, here are the technologies that will soon be as basic as the air we breathe.By A. Peter Klimley. 2003
Marine biologist Pete Klimley swims with the sharks. He was one of the first scientists to free-dive among sharks, and…
he has spent nearly thirty years studying shark behavior, sometimes swimming in schools of several hundred sharks. From his firsthand observations he has learned that sharks are not the vicious man-eaters that we imagine, but fascinating animals with complex behaviors.Most people who think of sharks at all think immediately of great white sharks. But there are more than four hundred species of shark. Dr. Klimley has studied several species, most notably the great white and the hammerhead. (He describes the great white as the athlete among sharks, and the hammerhead as the Ph.D. of the shark world.) In The Secret Life of Sharks Dr. Klimley reveals the significant discoveries he made about hammerhead navigation and great white eating habits. By studying hammerheads gathered around underwater seamounts, Dr. Klimley learned that hammerheads rely on sophisticated tracking of ocean-floor magnetism to navigate. His long-term study of great white sharks off the California coast demonstrated that these huge sharks prefer to eat seals and sea lions because of the energy contained in their fatty bodies. They are selective eaters, not the man-eaters we expect, and they sometimes go weeks between meals. But Dr. Klimley did observe a ritualized behavior that great whites practice in order to avoid deadly disputes over prey that one shark has captured and another wants.Although we have learned a great deal about shark behavior, says Dr. Klimley, there is much that we do not know. Unfortunately we are destroying these magnificent creatures of the deep through overfishing and degradation of the oceans. Already some populations of sharks have declined steeply.Vividly written by one of the foremost authorities on sharks, The Secret Life of Sharks is a fascinating account of some of the world's most magnificent animals.By Rohit Anand, Abhinav Juneja, Digvijay Pandey, Sapna Juneja, Nidhi Sindhwani. 2024
META-HEURISTIC ALGORITHMS FOR ADVANCED DISTRIBUTED SYSTEMS Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic…
techniques are increasingly gaining favor as tools for optimizing distributed systems—generally, to enhance the utility and precision of database searches. Carefully applied, they can increase system effectiveness, streamline operations, and reduce cost. Since many of these techniques are derived from nature, they offer considerable scope for research and development, with the result that this field is growing rapidly. Meta-Heuristic Algorithms for Advanced Distributed Systems offers an overview of these techniques and their applications in various distributed systems. With strategies based on both global and local searching, it covers a wide range of key topics related to meta-heuristic algorithms. Those interested in the latest developments in distributed systems will find this book indispensable. Meta-Heuristic Algorithms for Advanced Distributed Systems readers will also find: Analysis of security issues, distributed system design, stochastic optimization techniques, and more Detailed discussion of meta-heuristic techniques such as the genetic algorithm, particle swam optimization, and many others Applications of optimized distribution systems in healthcare and other key??industries Meta-Heuristic Algorithms for Advanced Distributed Systems is ideal for academics and researchers studying distributed systems, their design, and their applications.By Scott Riley. 2024
Learn to create seamless designs backed by a responsible understanding of the human mind. This new edition is fully updated and…
reworked to employ a realistic, challenging, and practical approach to interface design, presenting state of the art scientific studies in behavioral sciences, interface design and the psychology of design. All with modern, up-to-date examples and screenshots. The practical portion of this edition has been completely reworked, giving you the chance to follow along with a real, proven design process that has produced several successful products imbued with the principles of mindful, responsible design.You'll examine how human behavior can be used to integrate your product design into lifestyle, rather than interrupt it, and make decisions for the good of those that are using your product. You will also learn about the neurological aspects and limitations of human vision and perception; about our attachment to harmony and dissonance; and about our brain’s propensity towards pattern recognition and how we perceive the world around us. In the second half of the book, you’ll follow along with the key phases of a design project, implementing what you have learned in an end-to-end, practical setting. Design is a responsibility, but not enough designers understand the human mind or the process of thought. Mindful Design, Second Edition introduces the areas of brain science that matter to designers, and passionately explains how those areas affect each human’s day-to-day experiences with products and interfaces, providing a battle-tested toolkit to help you make responsible design decisions. What You'll Learn Review how attention and distraction work and the cost of attentional switchingUse Gestalt principles to communicate visual groupingEnsure your underlying models make sense to your audienceUse time, progression, and transition to create a compositionCarefully examine controlling behavior through reductionist and behaviorist motivation concepts Apply the theoretical knowledge to practical, mindful interface design Who This Book Is For The primary audience for this book is professional designers who wish to learn more about the human mind and how to apply that to their work. The book is also useful for design-focused product owners and startup founders who wish to apply ethical thinking to a team, or when bootstrapping their products. The secondary audience is design students who are either studying a ‘traditional’ visual design course, or a UX/interaction design course who have a desire to learn how they might be able to apply mindful design to their early careers. Finally, a tertiary audience for this book would be tutors involved in teaching design, or peripheral, courses who may wish to incorporate its teachings into their lectures, workshops or seminars.By Durgesh Mishra, Xin She Yang, Aynur Unal, Dharm Singh Jat. 2024
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA…
2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16–17, 2023. This book discusses the topics such as data science, artificial intelligence, machine learning, quantum computing, big data and cloud security, computation security, big data security, information security, forecasting, data analytics, mathematics for data science, graph theory and application in data science, data visualization, computer vision, and analytics for social networks.This book proceedings addresses a crucial gap in understanding the impact of technology on Business Model Innovation (BMI). It emphasizes…
the need for further research to explore the intricate relationship between technology and BMI, focusing on opportunities and challenges. By delving into how technology influences emerging business model innovations and enhances operational efficiency, the publication aims to advance knowledge. Inviting diverse research methods, it sheds light on various ideas within the technology and BMI realm. Tailored for students, scholars, professionals, and policymakers, this book contributes to the evolving field of BMI and technology.This book presents a comprehensive view of the different theories of risk management in water, drawing on recent studies that…
serve to inform the way that practitioners consider their own risk practice.While it is commonplace to see risk described in technical and engineering terms when discussing water, this book argues that this is a flawed practice that results in poor decision-making, particularly where water intersects with social elements and the community. Challenging these traditionally held notions of risk, this book introduces the psychological and sociological underpinnings to water risk decisions. Using these, it argues for a broader view of risk-based thinking and proposes a number of evidence-based actions for policymakers to directly implement. Drawing on primary research conducted with water professionals across a variety of roles, this book highlights how the effect of psychological inputs, such as dread and reputation, can create barriers to implementing novel water solutions or projects. Through understanding the biases covered in this book, water practitioners can work to support processes that seek to encourage new and innovative methods in water management.This book will be of great interest to professionals working in water management, including those in government roles, planning departments and consultancies. It is also a great reference for students of both water resource management and risk studies more generally.Research Software Engineering: A Guide to the Open Source Ecosystem strives to give a big-picture overview and an understanding of…
the opportunities of programming as an approach to analytics and statistics. The book argues that a solid "programming" skill level is not only well within reach for many but also worth pursuing for researchers and business analysts. The ability to write a program leverages field-specific expertise and fosters interdisciplinary collaboration as source code continues to become an important communication channel. Given the pace of the development in data science, many senior researchers and mentors, alongside non-computer science curricula lack a basic software engineering component. This book fills the gap by providing a dedicated programming-with-data resource to both academic scholars and practitioners.Key Features overview: breakdown of complex data science software stacks into core components applied: source code of figures, tables and examples available and reproducible solely with license cost-free, open source software reader guidance: different entry points and rich references to deepen the understanding of selected aspectsBy Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseBy Amir Husain. 2017
&“A must-read for anyone looking to understand how artificial intelligence is poised to transform human society and life.&” —Paul Scharre,…
Author of Four Battlegrounds: Power in the Age of Artificial IntelligenceThe future is now. Acclaimed technologist and inventor Amir Husain explains how we can live amidst the coming age of sentient machines and artificial intelligence—and not only survive, but thrive.Artificial &“machine&” intelligence is playing an ever-greater role in our society. We are already using cruise control in our cars, automatic checkout at the drugstore, and are unable to live without our smartphones. The discussion around AI is polarized; people think either machines will solve all problems for everyone, or they will lead us down a dark, dystopian path into total human irrelevance. Regardless of what you believe, the idea that we might bring forth intelligent creation can be intrinsically frightening. But what if our greatest role as humans so far is that of creators?Amir Husain, a brilliant inventor and computer scientist, argues that we are on the cusp of writing our next, and greatest, creation myth. It is the dawn of a new form of intellectual diversity, one that we need to embrace in order to advance the state of the art in many critical fields, including security, resource management, finance, and energy. &“In The Sentient Machine, Husain prepares us for a brighter future; not with hyperbole about right and wrong, but with serious arguments about risk and potential&” (Dr. Greg Hyslop, Chief Technology Officer, The Boeing Company). He addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Husain boils down complex computer science and AI concepts into clear, plainspoken language and draws from a wide variety of cultural and historical references to illustrate his points. Ultimately, Husain challenges many of our societal norms and upends assumptions we hold about &“the good life.&”By Brad Kessler. 2009
Acclaimed novelist Brad Kessler lived in New York City but longed for a life on the land where he could…
grow his own food. After years of searching for a home, he and his wife, photographer Dona Ann McAdams, found a mountain farmhouse on a dead-end road, with seventy-five acres of land. One day, when Dona returned home with fresh goat milk from a neighbor's farm, Kessler made a fresh chèvre, and their life changed forever. They decided to raise dairy goats and make cheese. Goat Song tells about what it's like to live intimately with animals who directly feed you. As Kessler begins to live the life of a herder -- learning how to care for and breed and birth goats -- he encounters the pastoral roots of so many aspects of Western culture. Kessler reflects on the history and literature of herding, and how our diet, our alphabet, our religions, poetry, and economy all grew out of a pastoralist milieu among hoofed animals. Kessler and his wife adapt to a life governed by their goats and the rhythm of the seasons. And their goats give back in immeasurable ways, as Kessler proves to be a remarkable cheesemaker, with his first tomme of goat cheese winning lavish praise from America's premier cheese restaurants. In the tradition of Thoreau's Walden and Annie Dillard's Pilgrim at Tinker Creek, Goat Song is both a spiritual quest and a compelling and beautiful chronicle of living by nature's rules.This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in…
Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.By Stefan Schiffner, Sebastien Ziegler, Adrian Quesada Rodriguez. 2022
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the…
Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.comBy Volodymyr Tonkonogyi, Vitalii Ivanov, Justyna Trojanowska, Gennadii Oborskyi, Milan Edl, Ivan Kuric, Ivan Pavlenko, Predrag Dasic. 2020
This book offers a timely yet comprehensive snapshot of innovative research and developments in the area of manufacturing. It covers…
a wide range of manufacturing processes, such as cutting, coatings, and grinding, highlighting the advantages provided by the use of new materials and composites, as well as new methods and technologies. It discusses topics in energy generation and pollution prevention. It shows how computational methods and mathematical models have been applied to solve a number of issues in both theoretical and applied research. Based on selected papers presented at the Grabchenko’s International Conference on Advanced Manufacturing Processes (InterPartner-2019), held in Odessa, Ukraine on September 10-13, 2019, this book offers a timely overview and extensive information on trends and technologies in the area of manufacturing, mechanical and materials engineering. It is also intended to facilitate communication and collaboration between different groups working on similar topics, and to offer a bridge between academic and industrial researchers.By Juan Julian Merelo, Fernando Melício, José M. Cadenas, António Dourado, Kurosh Madani, António Ruano, Joaquim Filipe. 2019
This book gathers revised and extended versions of the best papers presented at the 8th International Joint Conference on Computational…
Intelligence (IJCCI 2016), which was held in Porto, Portugal from 9 to 11 November 2016. The papers address three main fields of Computational Intelligence, namely: Evolutionary Computation, Fuzzy Computation, and Neural Computation. In addition to highlighting recent advances in these areas, the book offers veteran researchers new and innovative solutions, while also providing a source of information and inspiration for newcomers to the field.By Bob Hughes. 2016
It’s hammered into us from birth that ‘all good things come at a price’. Today, that price looks apocalyptic, with…
wars, exploitation and environmental collapse in every part of the globe. Some suggest that the carnage is “a price worth paying” for technological progress. No pain, no gain. But technology is precisely the business of minimising the costs and impacts of existence… and by whole orders of magnitude. By now, all human beings should be leading creative, leisure-filled lives in a pristine world of burgeoning diversity. So how did it go so wrong? In a word, inequality. In The Bleeding Edge, Bob Hughes argues that unequal societies are incapable of using new technologies well. Wherever elites exist, self-preservation decrees that they must take control of new technologies to protect and entrench their status, rather than satisfy people’s needs. Hughes pursues the latest discoveries about the effects of social inequality on human health, into the field of human environmental impact, and traces today’s ecological crisis back to the rise of the world’s first elites, 5,000 years ago. He argues that new technologies have never emerged from elites or from the clash of competitive forces, but from largely voluntary, egalitarian collaborations of the kind that produced the world’s first working computers. Finally, Hughes shows that an egalitarian world is not ‘pie in the sky' but our evolutionary homeland, the glue that holds societies together, and the “cradle of invention” from which all our best ideas emerge. The book concludes: ‘Let’s assume that the commitment to human equality that’s written into the Universal Declaration of Human Rights means exactly what it says, and take it from there.’By Fahim Amir. 2020
Forget everything you think you know about nature. Fahim Amir’s award-winning book takes pure delight in posing unexpected questions: Are…
animals victims of human domination, or heroes of resistance? Is nature pristine and defenceless, or sentient and devious? Is being human really a prerequisite for being political? In a world where birds on Viagra punch above their weight and termites hijack the heating systems of major cities, animals can be recast as vigilantes, agitators, and public enemies in their own right. Under Amir’s magic spell, pigs transform from slaughterhouse innocents into rioting revolutionaries, pigeons from urban pests into unruly militants, honeybees from virtuous fuzzballs into shameless centrefold models for eco-capitalism. As paws, claws, talons, and hooves seize the means of production, Being and Swine spirals higher and higher into a heady thesis that becomes more convincing by the minute. At the heart of Amir’s writing is a deep optimism and bracingly fresh reading of Marxist, post-colonial, and feminist theory, building upon the radical scholarship of Donna J. Haraway and others. Contrarian, whip-smart, and wildly innovative, no other book will laugh at your convictions quite like this one.