|
|
Books > Computing & IT
The development of artificial intelligence (AI) involves the
creation of computer systems that can do activities that would
ordinarily require human intelligence, such as visual perception,
speech recognition, decision making, and language translation.
Through increasingly complex programming approaches, it has been
transforming and advancing the discipline of computer science.
Artificial Intelligence Methods and Applications in Computer
Engineering illuminates how today's computer engineers and
scientists can use AI in real-world applications. It focuses on a
few current and emergent AI applications, allowing a more in-depth
discussion of each topic. Covering topics such as biomedical
research applications, navigation systems, and search engines, this
premier reference source is an excellent resource for computer
scientists, computer engineers, IT managers, students and educators
of higher education, librarians, researchers, and academicians.
Based on years of research and 121 real-life first dates,
relationship expert Wendy Newman dishes up practical wisdom for
navigating the online dating trenches with grace, efficiency, and a
strong dose of humour. Wendy Newman has made every imaginable
dating mistake so you don't have to. Part guidebook, part personal
tell-all, 121 First Dates chronicles Wendy's funny, real-life
misadventures and the practical wisdom she gained from them. Her
dating tales will find you laughing, commiserating, and nodding
your head as you learn how to stay in the dating game until you
find the right man, just like Wendy did. This book busts myths,
answers age-old questions, and examines pitfalls that make you want
to give up on dating altogether. Just when you're about to submit
to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns,
121 First Dates will inspire you to keep stepping out. Wendy
discusses how to date successfully and efficiently, avoid the most
common dating pitfalls, have an amazing first date with anyone, end
uncomfortable situations with grace, and much, much more. She
offers up realistic Dos and Don'ts as well as tips for making the
most of any situation you find yourself in-whether you want to run
or you think he's the one. Brimming with humour, hope, and
authenticity, 121 First Dates will give every woman the tools,
confidence, and determination to be and stay real when dating. How
else will you find the best match for you?
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
This book explores 10 unique facets of Internet health and safety,
including physical safety, information security, and the
responsible use of technology, offering takeaways from interviews
with experts in the field and suggestions for proactively improving
users' Internet safety. The Internet has become for many
people—especially students and young adults—an essential and
intrinsic part of their lives. It makes information available to be
shared worldwide, at any time; enables learning about any topic;
and allows for instantaneous communication. And it provides endless
entertainment as well. But the benefits of online access are
accompanied by serious potential risks. This book covers the key
elements of Internet health and safety, including physical safety,
information security, and the responsible use of technology. It
begins with an introductory essay that gives readers the necessary
conceptual framework, and then explains specific topics such as
cyberbullying, file sharing, online predators, Internet fraud, and
obscene and offensive content. The book also answers readers'
questions in a "Q & A" section with a subject expert and
includes a directory of resources that provides additional
information and serves as a gateway to further study.
Even though terrorism poses an increasing threat to multinational
companies, corporate leaders can thwart attacks by learning to
navigate the complexities of foreign governments, social unrest,
and cultural dissonance. Multinational corporations are on the
front lines of terrorism and cyberattacks—two of the world's
biggest threats to global security. How can corporate leaders
mitigate their organizations' risks and develop an infrastructure
that detects and deters a security menace before it happens? This
timely reference lays out essential political context and
historical background to help executives identify contemporary
threats and understand the interconnections between threat dynamics
in an increasingly dangerous international environment. This
compelling work is organized into seven chapters. The beginning
chapters profile the specific risks for multinational companies and
detail which global—and regional—factors might propagate
violence targeted at American-based businesses. Next, two
historical case studies on terrorist assaults at Tigantourine and
Mombasa illustrate how counterterrorism can successfully thwart
potential attacks against business targets. The final part
describes industrial espionage and criminal activity and then
outlines a corporate counterterror blueprint to combat the prospect
of terrorism, providing specific recommendations for preventative
measures.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
In a world of relentless change and accelerating uncertainty,
organizations must continuously adapt and evolve to compete in
environments they never anticipated. This requires upfront design
for adaptability, and closer business alignment of software systems
and team structures. To succeed, organizations must integrate
advanced techniques from business strategy, software architecture,
and team organization. Now, independent technology consultant
Susanne Kaiser introduces a powerful unified toolset you can use to
design, build, and evolve adaptive software systems and teams that
are optimized for ever-faster rates of change. Kaiser shows how to
combine Wardley Maps, Domain-Driven Design (DDD), and Team
Topologies to understand your problem domain more clearly, focus on
your crucial core subdomain, and reflect the dynamics of your
business landscape. Using these tools, you'll learn how to design
evolvable services within an adaptive system, which is in turn
owned by a team organization that optimizes for fast flow. Kaiser
goes beyond Domain Driven Design's popular patterns to reveal how
DDDenables strategic design for long-term business success. Her
accessible explanations and practical examples show how to combine
DDD with intuitive Wardley Maps and powerful Team Topologies to
improve success across the full lifecycle: strategy, design,
implementation, deployment, operation, and evolution. As she
demystifies and demonstrates these tools, Kaiser answers the most
important questions faced by project participants—from CxOs to
architects to software developers.
Network Security and Cryptography introduces the basic concepts in
computer networks and the latest trends and technologies in
cryptography and network security. The book is a definitive guide
to the principles and techniques of cryptography and network
security, and introduces basic concepts in computer networks such
as classical cipher schemes, public key cryptography,
authentication schemes, pretty good privacy, and Internet security.
It features the latest material on emerging technologies, related
to IoT, cloud computing, SCADA, blockchain, smart grid, big data
analytics, and more. Primarily intended as a textbook for courses
in computer science and electronics & communication, the book
also serves as a basic reference and refresher for professionals in
these areas. Features: Includes the latest material on emerging
technologies, related to IoT, cloud computing, smart grid, big data
analytics, blockchain, and more Features separate chapters on the
mathematics related to network security and cryptography Introduces
basic concepts in computer networks including classical cipher
schemes, public key cryptography, authentication schemes, pretty
good privacy, Internet security services, and system security
Includes end of chapter review questions
Over the last 20 years, the role of unmanned aircraft systems in
modern warfare has grown at an unprecedented rate. No longer simply
used for intelligence, data collection or reconnaissance, drones
are routinely used for target acquisition and to strike enemy
targets with missiles and bombs. Organized by nationality, Military
Drones offers a compact guide to the main unmanned aerial vehicles
being flown in combat zones today. These include classics, such as
the MQ-1 Predator, primarily used for intelligence gathering; the
Black Hornet Nano, a micro UAV that is so small it can fit in the
palm of your hand and is used by ground troops for local
situational awareness; the Chinese tri-copter Scorpion, which is
ideal for the stationary observation and strike role in a built-up
area; and the French EADS Talarion, a twinjet long-endurance UAV
designed for high-altitude surveillance. Illustrated with more than
100 photographs and artworks, Military Drones provides a detailed
insight into the specialist military unmanned aerial vehicles that
play a key role in the modern battle space.
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
The development of new and effective analytical and numerical
models is essential to understanding the performance of a variety
of structures. As computational methods continue to advance, so too
do their applications in structural performance modeling and
analysis. Modeling and Simulation Techniques in Structural
Engineering presents emerging research on computational techniques
and applications within the field of structural engineering. This
timely publication features practical applications as well as new
research insights and is ideally designed for use by engineers, IT
professionals, researchers, and graduate-level students.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|