|
|
Books > Computing & IT
Based on years of research and 121 real-life first dates,
relationship expert Wendy Newman dishes up practical wisdom for
navigating the online dating trenches with grace, efficiency, and a
strong dose of humour. Wendy Newman has made every imaginable
dating mistake so you don't have to. Part guidebook, part personal
tell-all, 121 First Dates chronicles Wendy's funny, real-life
misadventures and the practical wisdom she gained from them. Her
dating tales will find you laughing, commiserating, and nodding
your head as you learn how to stay in the dating game until you
find the right man, just like Wendy did. This book busts myths,
answers age-old questions, and examines pitfalls that make you want
to give up on dating altogether. Just when you're about to submit
to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns,
121 First Dates will inspire you to keep stepping out. Wendy
discusses how to date successfully and efficiently, avoid the most
common dating pitfalls, have an amazing first date with anyone, end
uncomfortable situations with grace, and much, much more. She
offers up realistic Dos and Don'ts as well as tips for making the
most of any situation you find yourself in-whether you want to run
or you think he's the one. Brimming with humour, hope, and
authenticity, 121 First Dates will give every woman the tools,
confidence, and determination to be and stay real when dating. How
else will you find the best match for you?
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
This book explores 10 unique facets of Internet health and safety,
including physical safety, information security, and the
responsible use of technology, offering takeaways from interviews
with experts in the field and suggestions for proactively improving
users' Internet safety. The Internet has become for many
people—especially students and young adults—an essential and
intrinsic part of their lives. It makes information available to be
shared worldwide, at any time; enables learning about any topic;
and allows for instantaneous communication. And it provides endless
entertainment as well. But the benefits of online access are
accompanied by serious potential risks. This book covers the key
elements of Internet health and safety, including physical safety,
information security, and the responsible use of technology. It
begins with an introductory essay that gives readers the necessary
conceptual framework, and then explains specific topics such as
cyberbullying, file sharing, online predators, Internet fraud, and
obscene and offensive content. The book also answers readers'
questions in a "Q & A" section with a subject expert and
includes a directory of resources that provides additional
information and serves as a gateway to further study.
Even though terrorism poses an increasing threat to multinational
companies, corporate leaders can thwart attacks by learning to
navigate the complexities of foreign governments, social unrest,
and cultural dissonance. Multinational corporations are on the
front lines of terrorism and cyberattacks—two of the world's
biggest threats to global security. How can corporate leaders
mitigate their organizations' risks and develop an infrastructure
that detects and deters a security menace before it happens? This
timely reference lays out essential political context and
historical background to help executives identify contemporary
threats and understand the interconnections between threat dynamics
in an increasingly dangerous international environment. This
compelling work is organized into seven chapters. The beginning
chapters profile the specific risks for multinational companies and
detail which global—and regional—factors might propagate
violence targeted at American-based businesses. Next, two
historical case studies on terrorist assaults at Tigantourine and
Mombasa illustrate how counterterrorism can successfully thwart
potential attacks against business targets. The final part
describes industrial espionage and criminal activity and then
outlines a corporate counterterror blueprint to combat the prospect
of terrorism, providing specific recommendations for preventative
measures.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
Demand for integral and sustainable solutions is on the rise. As
new ways of defining reality emerge, this generates the progression
of more humanistic and sustainable construction of operating
systems. Designing for Human-Machine Symbiosis using the URANOS
Model: Emerging Research and Opportunities is a pivotal reference
source for the latest research on human-centered system modeling
and methods to provide a generic system model to describe complex
non-linear systems. Featuring extensive coverage across a range of
relevant topics, such as pervasive computing systems, smart
environments, and smart industrial machines, this book is ideally
designed for researchers, engineers, and professionals seeking
current research on the integration of human beings and their
natural, informational, and socio-cultural environments into system
design.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Network Security and Cryptography introduces the basic concepts in
computer networks and the latest trends and technologies in
cryptography and network security. The book is a definitive guide
to the principles and techniques of cryptography and network
security, and introduces basic concepts in computer networks such
as classical cipher schemes, public key cryptography,
authentication schemes, pretty good privacy, and Internet security.
It features the latest material on emerging technologies, related
to IoT, cloud computing, SCADA, blockchain, smart grid, big data
analytics, and more. Primarily intended as a textbook for courses
in computer science and electronics & communication, the book
also serves as a basic reference and refresher for professionals in
these areas. Features: Includes the latest material on emerging
technologies, related to IoT, cloud computing, smart grid, big data
analytics, blockchain, and more Features separate chapters on the
mathematics related to network security and cryptography Introduces
basic concepts in computer networks including classical cipher
schemes, public key cryptography, authentication schemes, pretty
good privacy, Internet security services, and system security
Includes end of chapter review questions
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
The development of new and effective analytical and numerical
models is essential to understanding the performance of a variety
of structures. As computational methods continue to advance, so too
do their applications in structural performance modeling and
analysis. Modeling and Simulation Techniques in Structural
Engineering presents emerging research on computational techniques
and applications within the field of structural engineering. This
timely publication features practical applications as well as new
research insights and is ideally designed for use by engineers, IT
professionals, researchers, and graduate-level students.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
The WWW era made billions of people dramatically dependent on the
progress of data technologies, out of which Internet search and Big
Data are arguably the most notable. Structured Search paradigm
connects them via a fundamental concept of key-objects evolving out
of keywords as the units of search. The key-object data model and
KeySQL revamp the data independence principle making it applicable
for Big Data and complement NoSQL with full-blown structured
querying functionality. The ultimate goal is extracting Big
Information from the Big Data. As a Big Data Consultant, Mikhail
Gilula combines academic background with 20 years of industry
experience in the database and data warehousing technologies
working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and
PayPal, among others. He has authored three books, including The
Set Model for Database and Information Systems and holds four US
Patents in Structured Search and Data Integration.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|