Title search results
Showing 1 - 20 of 50362 items
Work Remotely (Penguin Business Experts Series)
By Anastasia Tohmé, Martin Worner. 2021
Remote working makes us happier, more productive and more profitable, but it can bring its own set of challenges. How…
do we manage our work-life balance; communicate and collaborate effectively as teams; and ensure our technology is efficient?In Work Remotely, Penguin Business Experts Anastasia Tohmé and Martin Worner explain everything you need to know:- Set your own targets and monitor productivity- Establish boundaries between working hours and free time- Manage effective communication and decision-making at a distanceIncluding case studies from the companies around the world who are innovating and revolutionizing the way we work, Work Remotely shares useful advice and practical tips to ensure you get the most out of working away from the office environment.Urne-Burial (Penguin Great Ideas #Vol. 32)
By Thomas Browne. 2005
Throughout history, some books have changed the world. They have transformed the way we see ourselves - and each other.…
They have inspired debate, dissent, war and revolution. They have enlightened, outraged, provoked and comforted. They have enriched lives - and destroyed them. Now Penguin brings you the works of the great thinkers, pioneers, radicals and visionaries whose ideas shook civilization and helped make us who we are.Written after the discovery of over forty Bronze Age burial urns in seventeenth-century Norfolk, Sir Thomas Browne's profound consideration of the inevitability of death remains one of the most fascinating and poignant of all reflections upon the vanity of mankind's lust for immortality.Whatever It Takes: A Story of Family Survival
By Elaine Lordan. 2007
Elaine Lordan is well-known to millions as EastEnders' Lynne Slater. Yet the real-life heartache and loss she came to suffer…
eclipsed even the rollercoaster troubles of her TV character. After leaving the show, Elaine lost her beloved mother when she took her life under a train. Then later that same year, just two days after her wedding, Elaine lost James, her one-year-old son and only child, to a rare condition. Whatever It Takes is the story of a no-nonsense working-class girl who hit the big time and enjoyed several happy years as one of the nation's favourite soap stars. Things took a downward turn as her heavy drinking and affair with a married man led to her being hounded by the press. Yet Pete would become the love of her life and together they would experience the unfathomable joy of having a child. This flush of happiness was short-lived, though, as Elaine felt the full impact of her mother's death, while her son James battled for life. It wasn't long before family life revolved around the hospital - hoping for the best, but fearing the worst.Full of larger-than-life characters from her boisterous Irish family and close circle of north London friends, Elaine tells her story with heart-wrenching candour. In this life-affirming memoir of overcoming tragedy, we see how Elaine's indomitable spirit and innate humour have carried her through even the bleakest moments, and how one woman's 'sink or swim' approach has ensured her survival.Twelve Words for Moss: Love, Loss And Moss
By Elizabeth-Jane Burnett. 2023
LONGLISTED FOR THE JHALAK PRIZE 2024A SUNDAY TIMES AND BBC COUNTRYFILE BEST NATURE BOOK OF THE YEAR 'Exquisite, luminous and…
quietly radical . . . I loved it' Lucy Jones'A fascinating, subtle and risk-taking book' Robert MacfarlaneGlowflake, Rocket, Small Skies, Kind Spears, Marilyn . . . Moss is known as the living carpet but if you look really closely, it contains its own irrepressible light.In Twelve Words for Moss, Elizabeth-Jane Burnett celebrates the unsung hero of the plant world with a unique blend of poetry, nature writing and memoir.Making her way through wetlands from Somerset to County Tyrone, Burnett discovers the hidden vibrancy and luminous beauty of these overlooked places. She also takes strength from them as she recovers from her grief at her father's death. As she meditates on and renames her favourite species of moss, she finds a healing power in language, and draws inspiration from the resilience and tenacity of her plant - and human - friends.'Burnett stretches the limits of prose, infusing it with poetic intensity to create a powerful, original voice' GuardianThe Trust Manifesto: What you Need to do to Create a Better Internet
By Damian Bradfield. 2019
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to…
the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data. But do we care? We're busy. We've got lives. We're pressed for time! There aren't enough hours in the day to read the terms and conditions. Or, maybe we're happy to trade our personal data for convenient services and to make our lives easier?Big data is the phenomenon of our age, but should we trust it without question? This is the trust dilemma.In 2009, Damian Bradfield founded WeTransfer, the largest file-sharing platform in the world with 50 million global users shipping more than one billion files of data a month. His unique experience of the big data economy has led him to question if there is another way to build the internet, one that is fairer and safer for everyone and, in The Trust Manifesto, he lays out this vision.Good Mourning: Moving Through Everyday Losses with Wisdom from the Other Side
By Theresa Caputo. 2020
Theresa Caputo, TLC’s Long Island Medium and the three-time New York Times bestselling author, teaches us how to ritualize and…
recover from the daily losses in our lives.Life on earth comes with losses that often go unrecognized, unacknowledged, and un-mourned. This invisible pain causes deeper emotional damage— devastation that Theresa Caputo has witnessed in many of her clients. Though they are suffering, they rarely understand where the anguish is coming from—or how to deal with it. Theresa’s clients often confuse their emotional distress with depression or anxiety. But it’s more than that. It’s grief, deep and profound, and it consumes the soul. The only relief, according to Theresa’s special gift she calls Spirit, is to pay more attention to how we experience, ritualize, and recover from the hurt in our lives.Once we name these feelings of grief, recognize the losses for what they are, and create mourning rituals around them, we can move through the pain and begin to heal. It isn’t just a good idea to mourn these types of upsets; it’s essential, so that we can then enjoy a fresh beginning.Regrets of the Dying: Stories and Wisdom That Remind Us How to Live
By Georgina Scull. 2022
'A beautiful and moving reminder to appreciate life' Roxie Nafousi, author of Manifest'This book may on first glance appear to…
be about death and regrets, but is in reality about life and choices. It is warmly life-affirming ... A magnificent read that will inspire. I loved it' Sue Black 'So beautiful ... Perfectly written and judged ... A wonderful book that made me grasp life a little more firmly' Dr Chris van Tulleken A powerful, moving and hopeful book exploring what people regret most when they are dying and how this can help us lead a better life. If you were told you were going to die tomorrow, what would you regret?Ten years ago, without time to think or prepare, Georgina Scull ruptured internally. The doctors told her she could have died and, as Georgina recovered, she began to consider the life she had led and what she would have left behind.Paralysed by a fear of wasting what seemed like precious time but also fully ready to learn how to spend her second chance, Georgina set out to meet others who had faced their own mortality or had the end in sight.From Concepts to Code: Introduction to Data Science
By Adam P. Tashman. 2024
The breadth of problems that can be solved with data science is astonishing, and this book provides the required tools…
and skills fot a broad audience. The reader takes a journey into the forms, uses, and abuses of data and models, and learns how to critically examine each step. Python coding and data analysis skills are built from the ground up, with no prior coding experience assumed. The necessary background in computer science, mathematics, and statistics is provided in an approachable manner.Each step of the machine learning lifecycle is discussed, from business objective planning to monitoring a model in production. This end-to-end approach supplies the broad view necessary to sidestep many of the pitfalls that can sink a data science project. Detailed examples are provided from a wide range of applications and fields, from fraud detection in banking to breast cancer classification in healthcare. The reader will learn the techniques to accomplish tasks that include predicting outcomes, explaining observations, and detecting patterns. Improper use of data and models can introduce unwanted effects and dangers to society. A chapter on model risk provides a framework for comprehensively challenging a model and mitigating weaknesses. When data is collected, stored, and used, it may misrepresent reality and introduce bias. Strategies for addressing bias are discussed. From Concepts to Code: Introduction to Data Science leverages content developed by the author for a full-year data science course suitable for advanced high school or early undergraduate students. This course is freely available and it includes weekly lesson plans.Threat Modeling: Designing for Security
By Adam Shostack. 2014
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies…
and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.Cyber War: The Next Threat to National Security and What to Do About It
By Richard A. Clarke, Robert K. Knake. 2010
An essential, eye-opening book about cyberterrorism, cyber war, and the next great threat to our national security. “Cyber War may…
be the most important book about national security policy in the last several years.” –SlateFormer presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals.Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security.Entdecken Sie "Enterprise Architektur entschlüsselt: Ein praxisorientierter Leitfaden von den Grundlagen bis zur Anwendung“ von Dennis Suhari, ein praxisorientiertes Werk,…
das die Förderung des Bewusstseins für Enterprise Architektur, die Vermittlung praktischer Erfahrungen und die Unterstützung der Leser bei der erfolgreichen Anwendung ihres Wissens in den Mittelpunkt stellt. Ein Schlüsselelement dieses Buches ist das praxisnahe Fallbeispiel, das einen einzigartigen Einblick in den Aufbau einer Enterprise Architektur von der Geschäfts- über die IT Architektur von Grund auf bietet.Was Sie erwartet:Fundamentale Grundlagen: Ein tiefgreifender Einblick in die essenziellen Grundlagen der Unternehmensarchitektur, um Schlüsselkonzepte und Prinzipien zu vermitteln, die als robuste Basis für die weitere Entwicklung dienen.Modellierung und praktische Tools: Entdecken Sie vielfältige Modellierungsmöglichkeiten und EAM-Tools, die inder Praxis zur Unterstützung der Architekturentwicklung eingesetzt werden.Architekturentwicklung in der Praxis: Anhand des Fallbeispiels der fiktiven Micayu GmbH, basierend auf den umfangreichen Erfahrungen des Autors, erleben Sie die Schritte der Entwicklung einer Unternehmensarchitektur von Grund auf.Zukunftsperspektiven: Ein Ausblick auf die Rolle der Künstlichen Intelligenz und dessen Einfluss auf das Enterprise Architektur ManagementArtificial Intelligence Governance and the Blockchain Revolution (Artificial Intelligence and the Rule of Law)
By Qiqi Gao, Jiteng Zhang. 2024
This is the first professional academic work in China to discuss artificial intelligence and blockchain together. Artificial intelligence is a…
productivity revolution, and its development has a significant and profound impact on global changes. However, at the same time, its development also brings a series of challenges to human society, such as privacy, security, and fairness issues. Therefore, the significance of blockchain is even more prominent. Blockchain is a revolution in production relations, which will propose important solutions to the challenges of privacy, security, and fairness that arise after the development of artificial intelligence. The book not only discusses the problems currently faced by the development of artificial intelligence, as well as the new opportunities and challenges that artificial intelligence brings to future global governance, but also explains the further development direction of the intelligent revolution from the perspective of blockchain.Innovations in Smart Cities Applications Volume 7: The Proceedings of the 8th International Conference on Smart City Applications, Volume 2 (Lecture Notes in Networks and Systems #938)
By Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir, Rani El Meouche, İsmail Rakıp Karaș. 2024
Many cities in the developed world are undergoing a digital revolution, and have placed the "smart city" on their list…
of priorities. Smart cities use technological solutions such as Internet of Things, AI, 5G, Big Data, Cloud computing, Smart Grid, as well as all the emerging technologies of the digital era, to improve the management and efficiency of the urban environment. The aim is to make residents happier, healthier, smarter and more prosperous, and to make the city greener, cleaner, more sustainable, more responsible, more functional, more resilient, and more competitive. Enhanced by extensive research studies and carried out under the guidance of international scientific experts in the field. This book explores various papers related to smart cities, including digital twins, geo-smart information systems, education, healthcare, economy and digital business, building and home automation, environment and agriculture, and information technologies and computer science.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14646)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14645)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.This proceedings presents papers from the Second International Adaptive and Sustainable Science, Engineering and Technology Conference (ASSET 2023), which took place…
simultaneously in Manchester, UK and Ikot Akpaden, Nigeria on 18-20, July 2023. The ASSET conference serves as an interactive forum for the advancement of the practice of adaptive and sustainable systems across the multiple disciplines and specialty areas involved with the science, engineering, and technology of integrated entities, complex systems, and networks. The conference provides an avenue for practitioners, researchers, managers, developers, analysts, educators, and users to exchange innovative ideas, concepts, applications, and lessons learned in addressing domain-specific problems, applications-oriented topics, methodologies, standards and multidisciplinary research opportunities and findings relating to ASSET systems.Advances in Knowledge Discovery and Data Mining: 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024, Taipei, Taiwan, May 7–10, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14647)
By De-Nian Yang, Xing Xie, Vincent S. Tseng, Jian Pei, Jen-Wei Huang, Jerry Chun-Wei Lin. 2024
The 6-volume set LNAI 14645-14650 constitutes the proceedings of the 28th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2024,…
which took place in Taipei, Taiwan, during May 7–10, 2024. The 177 papers presented in these proceedings were carefully reviewed and selected from 720 submissions. They deal with new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, big data technologies, and foundations.Israel/Palestine in World Religions: Whose Promised Land?
By S. Ilan Troen. 2024
The struggle over Israel/Palestine is not just another contest by competing nationalisms or an instance of geopolitical competition. It is…
also about control of sacred territory that involves local Jews, Muslims, and Christians as well as worldwide faith communities, each with their own interests and stake in what transpires. This balanced introduction to a complex subject presents the multiple positions within the great monotheistic traditions. It demonstrates that the secular discourses in the public square concerning ownership privileges, historical precedence, political rights, and justice that have allegedly replaced religious claims actually coexist with, and often complement, the theological. It explores the century-long tangle of secular and theological debates about Israel’s legitimacy. Whether readers support a Jewish state or are resolutely opposed, the serious and substantial scholarship of this well-reasoned and innovative book will contribute to a nuanced and better-informed understanding of this persistent issue that has entered its second century on the international agenda.Proceedings of the 2nd International Conference on Big Data, IoT and Machine Learning: BIM 2023 (Lecture Notes in Networks and Systems #867)
By Mohammad Shamsul Arefin, M. Shamim Kaiser, Touhid Bhuiyan, Nilanjan Dey, Mufti Mahmud. 2024
This book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Big Data, IoT and…
Machine Learning (BIM 2023), organised by Jahangirnagar University, Bangladesh, and Daffodil International University, Bangladesh, held in Dhaka, Bangladesh, during 6–8 September 2023. The book covers research papers in the field of big data, IoT and machine learning. The book is helpful for active researchers and practitioners in the field.This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermarking, IWDW 2023, held…
in Jinan, China, during November 25–26, 2023. The 22 full papers included in this book were carefully reviewed and selected from 48 submissions. The workshop focuses on subjects such as novel research, development and application of digital watermarking, data hiding, and forensic techniques for multimedia security.