Title search results
Showing 1 - 20 of 34659 items
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam…confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.What you will learnUnderstand core exam objectives to pass the CISM exam with confidenceCreate and manage your organization's information security policies and procedures with easeBroaden your knowledge of the organization's security strategy designingManage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectivesFind out how to monitor and control incident management proceduresDiscover how to monitor activity relating to data classification and data accessWho this book is forIf you are an aspiring information security manager, IT auditor, chief information security officer (CISO), or risk management professional who wants to achieve certification in information security, then this book is for you. A minimum of two years' experience in the field of information technology is needed to make the most of this book. Experience in IT audit, information security, or related fields will be helpful.
Pandemic Performance chronicles the many ways that people are surviving/thriving through performance in a global pandemic. Covering artists and events…from across the United States: from New York to California and from South Dakota to Texas, the chapters are equal parts theory and practice, weaving scholarship with personal experience from contributors who are interdisciplinary artists, scholars, journalists, and community organizers providing unique and invaluable perspectives on the complicated work of resilience during COVID-19. This study will hold interest for students and scholars in the performing arts, arts, and social justice as well as professional artmakers and creative community organizers.
By Adam Frost, Tobias Sturt, Jim Kynvin, Sergio Gallardo. 2022
How can you transform a spreadsheet of numbers into a clear, compelling story that your audience will want to pass…on? This book is a step-by-step guide to bringing data to life through visualisations, from static charts and maps to interactive infographics and motion graphics. Introducing a four-step framework to creating engaging and innovative visualisations, it helps you to: · Find the human stories in your datasets · Design a visual story that will resonate with your audience · Make a clear, persuasive visual that represents your data truthfully · Refine your work to ensure your visual expresses your story in the best possible way. This book also includes a portfolio of best-practice examples and annotated templates to help you choose the right visual for the right audience, and repurpose your work for different contexts.
By Sridhar V.. 2022
This book explores how data about our everyday online behaviour are collected and how they are processed in various ways…by algorithms powered by Artificial Intelligence (AI) and Machine Learning (ML). The book investigates the socioeconomic effects of these technologies, and the evolving regulatory landscape that is aiming to nurture the positive effects of these technology evolutions while at the same time curbing possible negative practices. The volume scrutinizes growing concerns on how algorithmic decisions can sometimes be biased and discriminative; how autonomous systems can possibly disrupt and impact the labour markets, resulting in job losses in several traditional sectors while creating unprecedented opportunities in others; the rapid evolution of social media that can be addictive at times resulting in associated mental health issues; and the way digital Identities are evolving around the world and their impact on provisioning of government services. The book also provides an in-depth understanding of regulations around the world to protect privacy of data subjects in the online world; a glimpse of how data is used as a digital public good in combating Covid pandemic; and how ethical standards in autonomous systems are evolving in the digital world. A timely intervention in this fast-evolving field, this book will be useful for scholars and researchers of digital humanities, business and management, internet studies, data sciences, political studies, urban sociology, law, media and cultural studies, sociology, cultural anthropology, and science and technology studies. It will also be of immense interest to the general readers seeking insights on daily digital lives.
By Rajesh Singh, Anita Gehlot, Bhupendra Singh, Mahesh Kumar Prajapat. 2022
This book is a platform for anyone who wishes to explore Artificial Intelligence in the field of agriculture from scratch…or broaden their understanding and its uses. This book offers a practical, hands-on exploration of Artificial Intelligence, machine learning, deep Learning, computer vision and Expert system with proper examples to understand. This book also covers the basics of python with example so that any anyone can easily understand and utilize artificial intelligence in agriculture field. This book is divided into two parts wherein first part talks about the artificial intelligence and its impact in the agriculture with all its branches and their basics. The second part of the book is purely implementation of algorithms and use of different libraries of machine learning, deep learning and computer vision to build useful and sightful projects in real time which can be very useful for you to have better understanding of artificial intelligence. After reading this book, the reader will an understanding of what Artificial Intelligence is, where it is applicable, and what are its different branches, which can be useful in different scenarios. The reader will be familiar with the standard workflow for approaching and solving machine-learning problems, and how to address commonly encountered issues. The reader will be able to use Artificial Intelligence to tackle real-world problems ranging from crop health prediction to field surveillance analytics, classification to recognition of species of plants etc.Note: T&F does not sell or distribute the hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka. This title is co-published with NIPA.
By Erik M. Champion. 2021
How would the humanities change if we grappled with the ways in which digital and virtual places are designed, experienced,…and critiqued?In Rethinking Virtual Places, Erik Malcolm Champion draws from the fields of computational sciences and other place-related disciplines to argue for a more central role for virtual space in the humanities. For instance, recent developments in neuroscience could improve our understanding of how people experience, store, and recollect place-related encounters. Similarly, game mechanics using virtual place design might make digital environments more engaging and learning content more powerful and salient. In addition, Champion provides a brief introduction to new and emerging software and devices and explains how they help, hinder, or replace our traditional means of designing and exploring places. Perfect for humanities scholars fascinated by the potential of virtual space, Rethinking Virtual Places challenges both traditional and recent evaluation methods to address the complicated problem of understanding how people evaluate and engage with the notion of place.
Get started quickly with IntelliJ, from installation to configuration to working with the source code and more. This tutorial will…show you how to leverage IntelliJ’s tools to develop clean, efficient Java applications. Author Ted Hagos will first walk you through buidling your first Java applications using IntelliJ. Then, he’ll show you how to analyze your application, top to bottom; using version control and tools that allow you expand your application for big data or data science applications and more. You'll also learn some of the IDE’s advanced features to fully maximize your application's capabilities. The last portion of the book focuses on application testing and deployment, and language- and framework- specific guidelines. After reading this book and working through its freely available source code, you'll be up to speed with this powerful IDE for today's Java development. What You Will Learn Use IntelliJ IDEA to build Java applications Set up your IDE and project Work with source code Extend your Java application to data science and other kinds of applications Test and deploy your application and much more Who This Book Is For Programmers new to IntelliJ IDEA who may have some prior exposure to Java programming.
Data Mining and Big Data: 6th International Conference, DMBD 2021, Guangzhou, China, October 20–22, 2021, Proceedings, Part II (Communications in Computer and Information Science #1454)
By Ying Tan, Jun Cai, Albert Zomaya, Yuhui Shi, Hongyang Yan. 2021
This two-volume set, CCIS 1453 and CCIS 1454, constitutes refereed proceedings of the 6th International Conference on Data Mining and…Big Data, DMBD 2021, held in Guangzhou, China, in October 2021. The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc.
By Andreas Gadatsch. 2021
IT-Controlling ist als Instrument zur Steuerung der Informationstechnik etabliert. Das Berufsbild des IT-Controllers bzw. der IT-Controllerin hat sich über längere…Zeit nur moderat verändert. Es wurde vor allem mit IT-Budgetierung, IT-Portfoliomanagement, IT-Kostenplanung, -Verrechnung und -kontrolle in Verbindung gebracht. Durch die Digitalisierung ist jedoch Bewegung in Ziele, Inhalte und Methoden gekommen. Neue Themen wie Steuerung der Digitalstrategie, Cloud-Controlling, Data Science u. a. sind in der Diskussion. Das Aufgabenprofil wandelt sich weg von der reinen IT-Kostenanalyse, hin zum Management der Digitalisierungsstrategie mit einem Fokus auf strategisches IT-Portfoliomanagement. Einige Stimmen sprechen bereits vom „Smart-Controlling“ oder „Digital-Controlling“. Das Buch stellt ein IT-Controlling-Konzept für das Digitale Zeitalter vor und erläutert die relevanten Methoden in praxisnaher Form.
By Lowell W. Beineke, Jay S. Bagga. 2021
In the present era dominated by computers, graph theory has come into its own as an area of mathematics, prominent…for both its theory and its applications. One of the richest and most studied types of graph structures is that of the line graph, where the focus is more on the edges of a graph than on the vertices. A subject worthy of exploration in itself, line graphs are closely connected to other areas of mathematics and computer science. This book is unique in its extensive coverage of many areas of graph theory applicable to line graphs. The book has three parts. Part I covers line graphs and their properties, while Part II looks at features that apply specifically to directed graphs, and Part III presents generalizations and variations of both line graphs and line digraphs.Line Graphs and Line Digraphs is the first comprehensive monograph on the topic. With minimal prerequisites, the book is accessible to most mathematicians and computer scientists who have had an introduction graph theory, and will be a valuable reference for researchers working in graph theory and related fields.
Logistics and Supply Chain Management: 7th International Conference, LSCM 2020, Tehran, Iran, December 23-24, 2020, Revised Selected Papers (Communications in Computer and Information Science #1458)
By Gerhard-Wilhelm Weber, Zohreh Molamohamadi, Erfan Babaee Tirkolaee, Abolfazl Mirzazadeh. 2021
This book constitutes selected and revised papers from the 7th International Conference Logistics and Supply Chain Management, held in December 2020…in Tehran, Iran. Due to the COVID-19 pandemic the conference was held online. The 17 full papers and 2 short papers pressented were thoroughly reviewed and selected out of 70 submissions. The papers are organized in the topical sections on information technology in supply chain management; production/scheduling and transportation in supply chain management; sustainable and resilient supply chain management; humanitarian supply chain management.
Advances in Data Science and Information Engineering: Proceedings from ICDATA 2020 and IKE 2020 (Transactions on Computational Science and Computational Intelligence)
By Hamid R. Arabnia, Mahmoud Abou-Nasr, Robert Stahlbock, Gary M. Weiss, Leonidas Deligiannidis, Cheng-Ying Yang. 2021
The book presents the proceedings of two conferences: the 16th International Conference on Data Science (ICDATA 2020) and the 19th…International Conference on Information & Knowledge Engineering (IKE 2020), which took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Papers cover all aspects of Data Science, Data Mining, Machine Learning, Artificial and Computational Intelligence (ICDATA) and Information Retrieval Systems, Information & Knowledge Engineering, Management and Cyber-Learning (IKE). Authors include academics, researchers, professionals, and students.Presents the proceedings of the 16th International Conference on Data Science (ICDATA 2020) and the 19th International Conference on Information & Knowledge Engineering (IKE 2020); Includes papers on topics from data mining to machine learning to informational retrieval systems;Authors include academics, researchers, professionals and students.
By Jerry Chun-Wei Lin, Anirban Mondal, Philippe Fournier-Viger, R. Uday Kiran, Jose M. Luna. 2021
This book provides an introduction to the field of periodic pattern mining, reviews state-of-the-art techniques, discusses recent advances, and reviews…open-source software. Periodic pattern mining is a popular and emerging research area in the field of data mining. It involves discovering all regularly occurring patterns in temporal databases. One of the major applications of periodic pattern mining is the analysis of customer transaction databases to discover sets of items that have been regularly purchased by customers. Discovering such patterns has several implications for understanding the behavior of customers. Since the first work on periodic pattern mining, numerous studies have been published and great advances have been made in this field. The book consists of three main parts: introduction, algorithms, and applications. The first chapter is an introduction to pattern mining and periodic pattern mining. The concepts of periodicity, periodic support, search space exploration techniques, and pruning strategies are discussed. The main types of algorithms are also presented such as periodic-frequent pattern growth, partial periodic pattern-growth, and periodic high-utility itemset mining algorithm. Challenges and research opportunities are reviewed.The chapters that follow present state-of-the-art techniques for discovering periodic patterns in (1) transactional databases, (2) temporal databases, (3) quantitative temporal databases, and (4) big data. Then, the theory on concise representations of periodic patterns is presented, as well as hiding sensitive information using privacy-preserving data mining techniques.The book concludes with several applications of periodic pattern mining, including applications in air pollution data analytics, accident data analytics, and traffic congestion analytics.
This book constitutes the refereed proceedings of the 17th China Conference on Machine Translation, CCMT 2020, held in Xining, China,…in October 2021. The 10 papers presented in this volume were carefully reviewed and selected from 25 submissions and focus on all aspects of machine translation, including preprocessing, neural machine translation models, hybrid model, evaluation method, and post-editing.
By Abid Yahya, Fasahat Ullah Siddiqui. 2022
This book presents the workings of major clustering techniques along with their advantages and shortcomings. After introducing the topic, the…authors illustrate their modified version that avoids those shortcomings. The book then introduces four modified clustering techniques, namely the Optimized K-Means (OKM), Enhanced Moving K-Means-1(EMKM-1), Enhanced Moving K-Means-2(EMKM-2), and Outlier Rejection Fuzzy C-Means (ORFCM). The authors show how the OKM technique can differentiate the empty and zero variance cluster, and the data assignment procedure of the K-mean clustering technique is redesigned. They then show how the EMKM-1 and EMKM-2 techniques reform the data-transferring concept of the Adaptive Moving K-Means (AMKM) to avoid the centroid trapping problem. And that the ORFCM technique uses the adaptable membership function to moderate the outlier effects on the Fuzzy C-meaning clustering technique. This book also covers the working steps and codings of quantitative analysis methods. The results highlight that the modified clustering techniques generate more homogenous regions in an image with better shape and sharp edge preservation.Showcases major clustering techniques, detailing their advantages and shortcomings;Includes several methods for evaluating the performance of segmentation techniques;Presents several applications including medical diagnosis systems, satellite imaging systems, and biometric systems.
This thoroughly revised textbook provides a description of current networking technologies and protocols as well as important new tools for…network performance analysis based on queuing theory. The third edition adds topics such as network virtualization and new related architectures, novel satellite systems (such as Space X, OneWeb), jitter and its impact on streaming services, packet level FEC techniques and network coding, new Markovian models, and advanced details on M/G/1 queuing models. The author also adds new selected exercises throughout the chapters and a new version of the slides and the solution manual. The book maintains its organization with networking technologies and protocols in Part I and then theory and exercises with applications to the different technologies and protocols in Part II. This book is intended as a textbook for master level courses in networking and telecommunications sectors.
By Jennifer Golbeck. 2018
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment…takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
Significant changes in the third edition include updated serial communication description (UART, SPI, and I2C), new serial communication examples, incorporation…of GNU gcc compiler, low power modes, modification of example programs from STM32L1 (Cortex-M3) to STM32L4 (Cortex-M4). The book introduces basic programming of ARM Cortex-M cores in assembly and C at the register level, and the fundamentals of embedded system design. It presents basic concepts such as data representations (integer, fixed-point, floating-point), assembly instructions, stack, and implementing basic controls and functions of C language at the assembly level. It covers advanced topics such as interrupts, mixing C and assembly, direct memory access (DMA), system timers (SysTick), multi-tasking, SIMD instructions for digital signal processing (DSP), and instruction encoding/decoding. The book also gives detailed examples of interfacing peripherals, such as general purpose I/O (GPIO), LCD driver, keypad interaction, stepper motor control, PWM output, timer input capture, DAC, ADC, real-time clock (RTC), and serial communication (USART, I2C, SPI, and USB).
By John Nussey. 2018
Bring your ideas to life with the latest Arduino hardware and software Arduino is an affordable and readily available hardware…development platform based around an open source, programmable circuit board. You can combine this programmable chip with a variety of sensors and actuators to sense your environment around you and control lights, motors, and sound. This flexible and easy-to-use combination of hardware and software can be used to create interactive robots, product prototypes and electronic artwork, whether you’re an artist, designer or tinkerer. Arduino For Dummies is a great place to start if you want to find out about Arduino and make the most of its incredible capabilities. It helps you become familiar with Arduino and what it involves, and offers inspiration for completing new and exciting projects. • Covers the latest software and hardware currently on the market • Includes updated examples and circuit board diagrams in addition to new resource chapters • Offers simple examples to teach fundamentals needed to move onto more advanced topics • Helps you grasp what’s possible with this fantastic little board Whether you’re a teacher, student, programmer, hobbyist, hacker, engineer, designer, or scientist, get ready to learn the latest this new technology has to offer!
This book serves the need for developing an insight and understanding of the cutting-edge innovation in Cloud technology. It provides…an understanding of cutting-edge innovations, paradigms, and security by using real-life applications, case studies, and examples. This book provides a holistic view of cloud technology theories, practices, and future applications with real-life examples. It comprehensively explains cloud technology, design principles, development trends, maintaining state-of-the-art cloud computing and software services. It describes how cloud technology can transform the operating contexts of business enterprises. It exemplifies the potential of cloud computing for next-generation computational excellence and the role it plays as a key driver for the 4th industrial revolution in Industrial Engineering and a key driver for manufacturing industries. Researchers, academicians, postgraduates, and industry specialists will find this book of interest.