Title search results
Showing 1 - 20 of 38573 items
By Malcolm Nance, Christopher Sampson. 2017
This book is written by two of the leading terrorist experts in the world - Malcolm Nance, NBC News/MSNBC terrorism…analyst and Christopher Sampson, cyber-terrorist expert. Malcolm Nance is a 35 year practitioner in Middle East Special Operations and terrorism intelligence activities. Chris Sampson is the terrorism media and cyber warfare expert for the Terror Asymmetric Project and has spent 15 years collecting and exploiting terrorism media. For two years, their Terror Asymmetrics Project has been attacking and exploiting intelligence found on ISIS Dark Web operations.Hacking ISIS will explain and illustrate in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world.More, the book will map out the cyberspace level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in Cyberspace and how to stop it in its tracks.Hacking ISIS is uniquely positioned to give an insider’s view into how this group spreads its ideology and brainwashes tens of thousands of followers to join the cult that is the Islamic State and how average computer users can engage in the removal of ISIS from the internet.
By Will Grant. 2018
Improve user experience by avoiding common frustrations and focusing on what mattersBook DescriptionDesign is everywhere. Take a look around you…right now and consider the products and services we use every day. You'll notice that our computer and phone operating systems, our web browsers, and the apps we use to work, order food, socialize and even date have been designed by UX specialists to offer you the best experiences when using their products and services.Of course, not all online experiences are designed with our best interests in mind. That's exactly why UX design is such an exciting and rewarding field—by learning the logic behind what people engage with and implementing it in your UX work, you can craft intuitive, accessible, and highly functional designs for your digital products.The 2nd edition of 101 UX Principles is the perfect companion when working on digital projects and making the right decisions for your users. From landing pages and checkout basket UIs to startup launch products and enterprise software solutions, a rich user experience design will maximize the success of your product.The book includes an exclusive invitation to join an online UX designers' community, where you can read the book alongside peers and other UX designers, and participate in various challenges and discussions with the author. See you there!Endorsements"This updated version of 101 UX Principles is a delight. Thoroughly revised, this edition includes great points from the earlier edition, offers some updated examples, and provides new examples of solid UX principles. Theory goes into practice with examples that we can all relate to. The author says this book is a 'shortcut to success' for less experienced designers and a challenge to accepted thinking for seasoned UX professionals. It is that, yes, and it is so much more. It's an educational and fun provocation to look at the world of UX differently – solidly from the user's point of view."—Elizabeth Churchill, Director of User Experience, Google"They say UX is liquid - you can't pin it down. Well, they haven't read this book. In a series of short, direct lessons, this book lays out the fundamental principles of good user experience design. Complete with case studies, a record of personal experience, and visual examples, Grant makes it clear why these techniques have found their way into the canon of UX best practices. This is a phenomenal reference guide as you set out on your UX journey or even if you've been on it for many years."—Jeff Gothelf, Author of Lean UXSneak a peek at some of the new and updated principles in this UX design book:Work with user expectations, not against themMake interactive elements obvious and discoverableOptimize your interface for mobileStreamline creating and entering passwordsRespect users' time and effort in your FormsUse animation with care in user interfacesHow to handle destructive user actionsChatbots are usually a bad ideaUse A/B testing to test your ideasLet users give feedback, but don't hassle themMake it clear to users if they're joining or signing-inOnly use modal views for blocking actionsComplexity can be good for some usersWho this book is forThis book is a distillation of Will's 20+ years of experience in the form of successful design principles to help early career UX designers learn the ropes, and provide experienced professionals with new ideas when building their products.UX/UI designers, product managers, entrepreneurs, aspiring strategists, and anyone creating a digital product, service or a campaign will find this book extremely useful.
By Basel Halak. 2022
This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for…anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more resilient PUF architectures. The second discusses the use of machine learning to mitigate the risks of security attacks on cyber-physical systems, with a particular focus on power plants. The third part provides an in-depth insight into the principles of malware analysis in embedded systems and describes how the usage of supervised learning techniques provides an effective approach to tackle software vulnerabilities.
By Thomas Liedtke. 2022
Dieses Buch erklärt die wichtigsten Fachbegriffe und Inhalte und ordnet diese den entsprechenden Bereichen zu. Einbezogen werden auch scheinbare Randgebiete,…die für die Informationssicherheit ebenfalls eine Rolle spielen. So wird der Themenkomplex Safety und Privacy hinsichtlich seiner Gemeinsamkeiten und Unterschiede beleuchtet. Das Buch zeigt aktuell verwendete Angriffsmuster und wie man sich dagegen schützen kann. Schutz muss dabei sowohl auf technischer Ebene (z. B. durch den Einsatz von Kryptographie) als auch auf organisatorischer und personeller Ebene (z. B. durch entsprechende Managementsysteme und Awareness-Schulungen) erfolgen. Wie lässt sich feststellen, wie sicher Daten sind? Wie lassen sich relevante Bedrohungen finden, gegen die man sich schützen muss? Wie verlaufen Risikoanalysen?
Database Systems for Advanced Applications: 27th International Conference, DASFAA 2022, Virtual Event, April 11–14, 2022, Proceedings, Part III (Lecture Notes in Computer Science #13247)
By Mukesh Mohania, P. Krishna Reddy, Anirban Mondal, Arnab Bhattacharya, Vikram Goyal, Janice Lee Mong Li, Divyakant Agrawal, Rage Uday Kiran. 2022
The three-volume set LNCS 13245, 13246 and 13247 constitutes the proceedings of the 26th International Conference on Database Systems for…Advanced Applications, DASFAA 2022, held online, in April 2021. The total of 72 full papers, along with 76 short papers, are presented in this three-volume set was carefully reviewed and selected from 543 submissions. Additionally, 13 industrial papers, 9 demo papers and 2 PhD consortium papers are included. The conference was planned to take place in Hyderabad, India, but it was held virtually due to the COVID-19 pandemic.
Intelligent and Cloud Computing: Proceedings of ICICC 2021 (Smart Innovation, Systems and Technologies #286)
By Rajkumar Buyya, Srikanta Patnaik, Debahuti Mishra, Prasant Mohapatra. 2022
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC…2021), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, during October 22–23, 2021. The book includes contributions on system and network design that can support existing and future applications and services. It covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.
Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough (Studies in Computational Intelligence #1027)
By Vinit Kumar Gunjan, Jacek M. Zurada. 2022
This book provides a systematic and comprehensive overview of AI and machine learning which have got the ability to identify…patterns in large and complex data sets. A remarkable success has been experienced in the last decade by emulating the brain computer interface. It presents the cognitive science methods and technologies that have played an important role at the core of practical solutions for a wide scope of tasks between handheld apps, industrial process control, autonomous vehicles, environmental policies, life sciences, playing computer games, computational theory, and engineering development. The chapters in this book focuses on audiences interested in machine learning, cognitive and neuro-inspired computational systems, their theories, mechanisms, and architecture, which underline human and animal behaviour, and their application to conscious and intelligent systems. In the current version, it focuses on the successful implementation and step-by-step explanation of practical applications of the domain. It also offers a wide range of inspiring and interesting cutting-edge contributions on applications of machine learning and cognitive science such as healthcare products, medical electronics, and gaming.
By John Kiriakou. 2022
With an experienced CIA officer as your teacher, you&’ll gain the knowledge and necessary tools to protect yourself and the…ones you love.No matter where we go, we leave tracks and clues of our existence without even knowing. Our electronic footprint becomes our invisible trail. In this day in age where the world seems to be at our fingertips and social media plays a huge role in our daily lives, it&’s hard not to leave part of our digital selves for others to find.Whether you&’re fascinated by the idea of disappearing, want to erase your digital footprint, or simply concerned about your safety and privacy, knowing how to become invisible is a survival skill that will come in handy.Through the easy-to-follow instructions, tips, tricks, and professional anecdotes in How to Disappear and Live off the Grid: A CIA Insider's Guide, you&’ll learn to vanish without a trace from John Kiriakou, a former CIA counterterrorism officer and senior investigator for the Senate Foreign Relations Committee responsible for the capture of Abu Zubaydah.
By John Kiriakou. 2022
A foolproof guide both to lying and to detecting deception,Lying and Lie Detection: A CIA Insider's Guide will teach you…how the pros can tell if and when somebody is lying. People lie all the time. Studies show that the average American lies between six and twenty times a day. Most lies are of the &“little white&” variety or are meant to spare a person&’s feelings. But what about the big lies? What about the consequential ones? You have a right to know when somebody is lying to you. Now, imagine if you had the tools to spot a lie from the truth—a guide to perfect your sixth sense. Whether it's finding out if you truly got the job, unmasking an infidelity, or a simple recommendation, you will no longer have to spend hours, days, or even weeks pondering about it. Through the easy-to-follow instructions and professional anecdotes in Lying and Lie Detection: A CIA Insider's Guide, you&’ll learn to lie and spot lies from John Kiriakou, a former CIA counterterrorism officer and senior investigator for the Senate Foreign Relations Committee responsible for the capture of Abu Zubaydah.Remember, CIA operations officers are trained to lie. They lie all the time. When they are working undercover, they are actually living a lie. With the CIA as a teacher, you&’ll learn how to tell.
Proceedings of the Fifth International Conference of Transportation Research Group of India: 5th CTRG Volume 3 (Lecture Notes in Civil Engineering #220)
By Animesh Das, S. Velmurugan, Manoranjan Parida, Avijit Maji. 2022
This book (in three volumes) comprises the proceedings of the Fifth Conference of Transportation Research Group of India (CTRG2019) focusing…on emerging opportunities and challenges in the field of transportation of people and freight. The contents of the volume include characterization of conventional and innovative pavement materials, operational effects of road geometry, user impact of multimodal transport projects, spatial analysis of travel patterns, socio-economic impacts of transport projects, analysis of transportation policy and planning for safety and security, technology enabled models of mobility services, etc. This book will be beneficial to researchers, educators, practitioners and policy makers alike.
By Elena Esposito. 2022
A proposal that we think about digital technologies such as machine learning not in terms of artificial intelligence but as…artificial communication.Algorithms that work with deep learning and big data are getting so much better at doing so many things that it makes us uncomfortable. How can a device know what our favorite songs are, or what we should write in an email? Have machines become too smart? In Artificial Communication, Elena Esposito argues that drawing this sort of analogy between algorithms and human intelligence is misleading. If machines contribute to social intelligence, it will not be because they have learned how to think like us but because we have learned how to communicate with them. Esposito proposes that we think of &“smart&” machines not in terms of artificial intelligence but in terms of artificial communication. To do this, we need a concept of communication that can take into account the possibility that a communication partner may be not a human being but an algorithm—which is not random and is completely controlled, although not by the processes of the human mind. Esposito investigates this by examining the use of algorithms in different areas of social life. She explores the proliferation of lists (and lists of lists) online, explaining that the web works on the basis of lists to produce further lists; the use of visualization; digital profiling and algorithmic individualization, which personalize a mass medium with playlists and recommendations; and the implications of the &“right to be forgotten.&” Finally, she considers how photographs today seem to be used to escape the present rather than to preserve a memory.
Make the most out of your Roblox experience with The Advanced Roblox Coding Book—now updated with new content, including updated…avatar customization, movement and animation updates, and more!The Advanced Roblox Coding Book provides next-level, beginner-friendly guidance for middle-grade readers using Roblox Studio and Lua code to create interactive games. Players will learn where and how to use scripts, how to introduce variables and customize graphic elements, and then how to put these skills together into fun and interesting games and experiences. With examples, step-by-step instructions, and game creation walkthroughs, this book has everything a Roblox creator needs!
By Mieczyslaw Pokorski. 2022
This book embraces a comprehensive range of research across several disciplines, providing insights and fresh perspectives on clinical topics, emphasizing…the integrative medical approach. The book also addresses an increasing role of artificial intelligence in the development of clinical methodologies, research, and patient-oriented care. The authors share expertise and experience in rehabilitation medicine whose healing-effects particularly depend on the interaction between the therapist and patient. Chapters present novel approaches in manual rehabilitative therapy of common painful and disabling neuromuscular ailments, exemplified but not limited to low back pain and migraine. The myofascial trigger point release therapy includes specific manipulations to muscles and connective tissue which reduce pain. Other chapters address the issues of providing long-range medical care to older adults burdened with chronic diseases, notably hypoxia-related pathologies and their sequalae, pointing to the advantages of care provided by a single primary care physician. Changing paradigm of care is essential in chronic atherosclerosis-based diseases like cardiovascular disorders or diabetes. Chapters provide results of international cohort studies on predictive factors for the long-range progress of such ailments based on anthropometric and lifestyle indicators. The book aims to meet the increasing interest and importance to patients of integrative health therapies. Medical rehabilitation and lifestyle changes increasingly gain scientific support in difficult-to-treat chronic conditions and should be integrated in a controlled manner into conventional medicine. The book is addressed to physiotherapists, medical scientists and clinicians, and allied healthcare professionals.
By Paul Roquet. 2022
Although virtual reality promises to immerse a person in another world, its true power lies in its ability to sever…a person’s spatial situatedness in this one. This is especially clear in Japan, where the VR headset has been embraced as a way to block off existing social environments and reroute perception into more malleable virtual platforms. Is immersion just another name for enclosure?In this groundbreaking analysis of virtual reality, Paul Roquet uncovers how the technology is reshaping the politics of labor, gender, home, and nation. He examines how VR in Japan diverged from American militarism and techno-utopian visions and became a tool for renegotiating personal space. Individuals turned to the VR headset to immerse themselves in three-dimensional worlds drawn from manga, video games, and genre literature. The Japanese government promised VR-operated robots would enable a new era of remote work, targeting those who could not otherwise leave home. Middle-aged men and corporate brands used VR to reimagine themselves through the virtual bodies of anime-styled teenage girls. At a time when digital platforms continue to encroach on everyday life, The Immersive Enclosure takes a critical look at these attempts to jettison existing social realities and offers a bold new approach for understanding the media environments to come.
By Brigitte Polzin, Herre Weigl, Peter Ringler. 2022
Die Autoren übertragen theoretische Grundlagen des Wissensmanagements anhand von Praxisbeispielen auf das Bauwesen. Grundlegende Begriffe, das TOM-Modell, die Konzepte von…Probst, Raub und Romhardt werden vermittelt. Aktiv betriebene Wissenskultur ist Basis eines erfolgreich umgesetzten Wissensmanagements, das als Führungsaufgabe im Bauwesen kooperatives, wissensorientiertes Führen voraussetzt. Die Lean-Philosophie wird mit einer werte- und zielorientierten und der Situativen Führung verbunden. Die hier vorgestellten Methoden und Tools eines bauaffinen Wissensmanagements zeigen und sichern vorhandenes und fördern die Generierung neuen Wissens im Unternehmen. Ein Implementierungskonzept zeigt, wie Wissensmanagement die Entwicklung von Unternehmenskultur, -organisation und Technik beeinflusst.
By Malka N. Halgamuge, Maitreyee Dutta, Gonçalo Marques, Jagriti Saini. 2022
This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality…(IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.
By Sanjay Misra, Amit Kumar Tyagi. 2022
This book covers a variety of topics and trends related to blockchain technology for smart era applications. The applications span…industries such as health, government, energy management, manufacturing, finance, information systems, all far beyond blockchain's original use in cryptocurrency. The authors present variants, new models, practical solutions, and technological advances related to blockchain in these fields and more. The applications within these fields include blockchain and cyber-security, IoT security and privacy using blockchain, and blockchain in industries and society . A variety of case studies are also included. The book is applicable to researchers, professionals, students, and professors in a variety of fields in communications engineering.
By Angus Deaton, Anne Case. 2020
A New York Times BestsellerA Wall Street Journal BestsellerA New York Times Notable Book of 2020A New York Times Book…Review Editors’ ChoiceShortlisted for the Financial Times and McKinsey Business Book of the YearA New Statesman Book to ReadFrom economist Anne Case and Nobel Prize winner Angus Deaton, a groundbreaking account of how the flaws in capitalism are fatal for America's working classDeaths of despair from suicide, drug overdose, and alcoholism are rising dramatically in the United States, claiming hundreds of thousands of American lives. Anne Case and Angus Deaton explain the overwhelming surge in these deaths and shed light on the social and economic forces that are making life harder for the working class. As the college educated become healthier and wealthier, adults without a degree are literally dying from pain and despair. Case and Deaton tie the crisis to the weakening position of labor, the growing power of corporations, and a rapacious health-care sector that redistributes working-class wages into the pockets of the wealthy. This critically important book paints a troubling portrait of the American dream in decline, and provides solutions that can rein in capitalism's excesses and make it work for everyone.
By Andrew Miller, Edward Felten, Arvind Narayanan, Joseph Bonneau, Steven Goldfeder. 2016
<p><i>Bitcoin and Cryptocurrency Technologies</i> provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether…you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. <p>How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more. <p> <li>An essential introduction to the new technologies of digital currency <li>Covers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much more <li>Features an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slides <li>Also suitable for use with the authors' Coursera online course <li>Electronic solutions manual (available only to professors)</li> </p>
By Mike Gayle. 2016
A compelling and emotional novel, for fans of Jojo Moyes and Jenny Colgan.'With a style similar to David Nicholls, Gayle's…writing is incisive, lyrical and very beautiful...It's impossible not to fall in love with the Hope family' Irish IndependentTom Hope is broken. Ever since his wife Laura died he hasn't been the same man, and definitely not the same father. Luckily for Tom his mother-in-law Linda is around to pick up the pieces and look after his two struggling daughters, Evie and Lola. But Tom getting arrested on the first anniversary of his wife's death is the last straw for Linda.In a last bid attempt to make Tom reconnect with his daughters she takes drastic action and leaves for Australia. With two fast-maturing daughters Tom has to learn how to accept his responsibilities and navigate the newly discovered world of single fatherhood - starting immediately. With only himself to rely on, will Tom fall back into grief or finally step up and be the father his girls need?Mike's new novel, The Man I Think I Know, is out now!