![]() |
![]() |
Your cart is empty |
||
A must-have, full-color guide to the Nikon D7100 The Nikon D7100 is an ideal camera for beginning photographers who may lack structured photography training but are still eager and determined to take great photos. And that?s where this fun-and-friendly guide comes in handy! Packed with more than 300 full-color photos, this introductory guide begins by helping you get a feel for the camera, get comfortable shooting in auto mode, managing playback options, and handle basic troubleshooting strategies. Veteran author Julie Adair King walks you through the D7100's features and encourages you to take creative control so that you can start capturing stunning pictures immediately. * Packs in more than 300 full-color photos that exemplify the basic photo skills needed to get great shots * Shares a wealth of information from one of the most popular digital photography authors * Walks you through adjusting manual settings to get better results from exposure, lighting, focus, and color * Contains an entire chapter on video mode * Explains how to send images to a computer for organizing, editing, and sharing Nikon D7100 For Dummies helps you get a grasp on your camera's controls so you can start taking memorable photos today!
In this classic of travel writing, first published sixty years ago, a Danish journalist records his experience of life in North Africa under colonial rule. Driving through the Sahara in a battered Chevrolet, having converted to Islam and with a knowledge of Arabic, he leaves the beaten track to discover communities and landscapes shrouded in mystery for centuries. Brushes with magicians, cave-dwellers and Sufi mystics, however, prove less astonishing than the cruelties inflicted on the local populations by Mussolini's generals.
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives. Providing an excellent in-depth analysis of global privacy and data protection law, it explores multiple regional and national jurisdictions, bringing together interdisciplinary international contributions from Europe and beyond. Chapters cover critical topics in the field, including key features of the General Data Protection Regulation (GDPR), border surveillance, big data, artificial intelligence, and biometrics. It also investigates the relationship between privacy and data protection law and other fields of law, such as consumer law and competition law. With its detailed exploration and insights into privacy and data protection, this Research Handbook will prove a useful resource for information and media law students as well as academics researching fields such as data protection and privacy law and surveillance or security studies.
Autonomous systems are on the frontiers of Artificial Intelligence (AI) research, and they are slowly finding their business applications. Driven mostly by Reinforcement Learning (RL) methods (one of the most difficult, but also the most promising modern AI algorithms), autonomous systems help create self-learning and self-optimising systems, ranging from simple game-playing agents to robots able to efficiently act in completely new environments. Based on in-depth study of more than 100 projects, Andrzej Wodecki explores RL as a key component of modern digital technologies, its real-life applications to activities in a value chain and the ways in which it impacts different industries. Artificial Intelligence in Management will help project leaders, decision makers and investors evaluate new autonomous projects and will serve as an inspiring guide for future research.
For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft (R) Office. Best-selling Technology in Action Complete uses practical content and hands- on projects to engage students in computing tasks and skills they can apply at work, in class, or at home. Designed for today's technically savvy students, the text introduces difficult concepts at a basic level early on, then expands upon these skills as students build mastery. The 16th edition brings innovative content updates, including new coverage of ethics, artificial intelligence, and managing a digital lifestyle, as well as several new features encouraging critical thinking.
This comprehensive book provides a detailed survey and practical examination of a wide range of legal and regulatory topics in HealthTech. Combining the insights of leading healthcare experts from around the world, chapters first examine the key characteristics, use cases and regulation in the field, before turning to the development and potential applications of cutting-edge technologies in healthcare. The book also addresses the main issues involved in setting up and running a HealthTech business, highlighting the vital role this will play in developing the technologies and skill sets required for the future of the sector. Key features include: analysis of the impact of emerging innovations on the accessibility, efficiency and quality of healthcare and its effects on healthcare providers examination of artificial intelligence, blockchain and digital identity applications in healthcare, alongside associated regulatory challenges guidance on the financial requirements of healthcare start-ups at different stages of growth and various collaboration and partnership models in the HealthTech market discussion of the major regulatory questions affecting the HealthTech industry, from data protection, public procurement and product liability, to the regulation of medical devices, intellectual property and advertising. HealthTech: Law and Regulation will be an invaluable resource for both in-house lawyers in the healthcare and pharmaceutical sectors, as well as those working for law firms practising in these areas. It will also be of interest to academics and students teaching or researching in healthcare law.
Understand microgrids and networked microgrid systems Microgrids are interconnected groups of energy sources that operate together, capable of connecting with a larger grid or operating independently as needed and network conditions require. They can be valuable sources of energy for geographically circumscribed areas with highly targeted energy needs, and for remote or rural areas where continuous connection with a larger grid is difficult. Microgrids' controllability makes them especially effective at incorporating renewable energy sources. Microgrids: Theory and Practice introduces readers to the analysis, design, and operation of microgrids and larger networked systems that integrate them. It brings to bear both cutting-edge research into microgrid technology and years of industry experience in designing and operating microgrids. Its discussions of core subjects such as microgrid modeling, control, and optimization make it an essential short treatment, valuable for both academic and industrial study. Readers will acquire the skills needed to address existing problems and meet new ones as this crucial area of power engineering develops. Microgrids: Theory and Practice also features: Incorporation of new cyber-physical system technologies for enabling microgrids as resiliency resources Theoretical treatment of a wide range of subjects including smart programmable microgrids, distributed and asynchronous optimization for microgrid dispatch, and AI-assisted microgrid protection Practical discussion of real-time microgrids simulations, hybrid microgrid design, transition to renewable microgrid networks, and more Microgrids: Theory and Practice is ideal as a textbook for graduate and advanced undergraduate courses in power engineering programs, and a valuable reference for power industry professionals looking to address the challenges posed by microgrids in their work.
Informed by the latest theoretical developments in studies of the social impacts of digital technology, Smart-Tech Society provides an empirically grounded and conceptually informed analysis of the impacts and paradoxes of smart-technology. While making life more convenient, smart-tech has also been associated with a loss of privacy and control over decision-making autonomy. Mark Whitehead and William Collier provide a critical analysis of the lived experience of smart-technology, presenting stories of varied social engagements with digital platforms and devices. Chapters explore the myriad contexts in and through which smart-tech insinuates itself within everyday life, the benefits it brings, and the processes through which it is being resisted. Detailed case studies explore the impacts of smart-technology across a broad range of fields including personal health, work, social life, urban management, and politics. Presenting new empirical evidence and analytical perspectives on the relationships between humans and smart-tech, this book will be of interest to academics and students in the fields of sociology, political science, human geography, and technology studies.
There is now a plethora of internet of things (IoT) devices on the market that can connect to the internet and the desired environment to produce sufficient and reliable data that is required by the government administration for a variety of purposes. Additionally, the potential benefits of incorporating artificial intelligence (AI) and machine learning into governance are numerous. Governments can use AI and machine learning to enforce the law, detect fraud, and monitor urban areas by identifying problems before they occur. The government can also use AI to easily automate processes and replace mundane and repetitive tasks. AI, IoT, and Blockchain Breakthroughs in E-Governance defines and emphasizes various AI algorithms as well as new internet of things and blockchain breakthroughs in the field of e-governance. Covering key topics such as machine learning, government, and artificial intelligence, this premier reference source is ideal for government officials, policymakers, researchers, academicians, practitioners, scholars, instructors, and students.
Based on the Association for Computing Imagery model curriculum guidelines, Foundations of Computer Science gives students a bird's eye view of Computer Science. This easy-to-read and easy-to-navigate text covers all the fundamentals of computer science required for first year undergraduates embarking on a computing degree. Updated to cover the latest technologies and changes to course requirements, this fourth edition features new chapters, including new coverage on social media and ethical issues.
Hone your advanced Excel 2016 skills. And earn the credential that proves it! Demonstrate your expertise with Microsoft Excel! Designed to help you practice and prepare for Microsoft Office Specialist (MOS): Excel Expert 2016 certification, this official Study Guide delivers: In-depth preparation for each MOS objective Detailed procedures to help build the skills measured by the exam Hands-on tasks to practice what you've learned Ready-made practice files Sharpen the skills measured by these objectives: Create and Manage Workbooks Apply Custom Formatting and Layouts Create Advanced Formulas Perform Data Analysis Create Advanced Charts and PivotTables
The Future of Copyright in the Age of Artificial Intelligence offers an extensive analysis of intellectual property and authorship theories and explores the possible impact artificial intelligence might have on those theories. The author makes compelling arguments via the exploration of authorship, ownership and artificial intelligence. First, the book advocates for a more holistic approach to authorship, arguing that there is no good reason to exclude computer-generated and artificial intelligence creations from copyright. Second, it conducts an open search for the right 'candidate' for ownership. In doing so, the book explores several possible legal frameworks, including assigning ownership to the programmer, the user, the AI itself and other alternatives such as the public domain or author-in-law approaches. Third, the book explores the concept of artificial intelligence as it has developed through the years in various fields, seeking to reframe the AI legal concept. For academic scholars and law students these pages frame the theoretical discussion about artificial intelligence creations and provide in depth discussion about artificial intelligence legal challenges.
This timely book addresses the increasingly widespread issue of online political hatred in Europe. Taking an interdisciplinary approach, it examines both the contributions of new technologies, in particular social networks, to the rise of this phenomenon, and the legal and political contexts in which it is taking place. Through an analysis of online hate speech and its impacts, Giovanni Ziccardi characterizes contemporary political hatred in Europe, highlighting its victims, communication strategies, and the creation of a cross-national network of extremists enabled by technology. He compares legal and political responses to the problem at both national and EU levels, as well as the approach taken by the US, in order to examine the effectiveness of current measures. Finally, he evaluates possible remedies for the situation, including both legal and technological solutions, and outlines the potential for a unified European framework to counter the spread of hatred online. Online Political Hate Speech in Europe will be an essential read for scholars and students in law and politics looking for an in-depth analysis of this issue. It will also be useful for politicians, policy makers, and practitioners seeking to understand the mechanisms underlying the circulation of political hatred.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book.
For coursesin Business Data Communication and Networking. Anintroduction to computer networking grounded in real-world examples In Computer Networks,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book - theInternet, and wireless networks, including Wireless LANs, broadband wireless,and Bluetooth. The 6th Edition is updated throughout to reflect the mostcurrent technologies, and the chapter on network security is rewritten to focuson modern security principles and actions. Tutorial videos on key networkingtopics and techniques are available to students on the companion website at www.pearsonglobaleditions.com Instructors are supported with a SolutionsManual to end-of-chapter exercises featured in the book, LecturePowerPoint slides, and extracted art and figures featured in thebook.
As the COVID-19 pandemic surged in 2020, questions of data privacy, cybersecurity, and ethics of the surveillance technologies centred an international conversation on the benefits and disadvantages of the appropriate uses and expansion of cyber surveillance and data tracking. This timely book examines and answers these important concerns. Pandemic Surveillance frames and defines digital privacy and security in the context of emerging surveillance technologies, providing informed dialogue on international conversations regarding pandemic surveillance. The book examines the challenges of regulating pandemic surveillance technologies across diverse geographical settings, including Europe and Latin America, along with comparative analysis of social credit systems in China and the United States. Margaret Hu and her impressive selection of contributors explore the legal, scientific and ethical challenges in a world with a growing data surveillance architecture, providing policy recommendations and forward-looking solutions, including the importance of ethical frameworks, to minimise potential misuse and abuse of surveillance technologies. Delivering a well-rounded examination of pandemic surveillance and data-tracking technologies, this book is a crucial read for researchers and scholars focused on information security and data privacy, including specialists in the area of cyber ethics and data ethics. Students and academics interested in health policy and bioethics will also benefit from the insights in this text.
Microservices become immensely popular because it promised to help organizations build loosely-coupled systems that allow for fast, easy change. But microservices systems haven’t always kept that promise. This book identifies the deeper problem -- how software architects and designers approach coupling – and introduces an important new approach for creating more successful designs whether you use microservices or not. Instead of blindly avoiding coupling, leading software architecture expert Vladik (Vlad) Khononov proposes a novel method that transforms it into a powerful design tool: “balanced multi-dimensional coupling.” Khononov begins by surveying existing methods of evaluating coupling, and illuminating their strengths and limitations in the context of modern distributed systems. Next, he introduces a new multi-dimensional coupling model, and demonstrates how to harness it to build modular software. Instead of focusing solely on a single approach, Balancing Coupling in Software Design illuminates underlying design principles that are ubiquitous in SOA, microservices, DDD, design patterns, and other paradigms, revealing how each of them can fail if thoughtful design principles for coupling are neglected -- and how balanced coupling can make all of them work more effectively.
Cybercrime is on the rise, and it is becoming easier and easier for criminals to steal your personal information. Toolkits to create viruses, spyware, and other forms of malware are now readily available to anyone wishing to defraud and do damage, and you could be leaving yourself open to attack. It is estimated that standard computer-based defence systems catch only 25% of malware attacks. Do you know the risks you're running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. Know your enemy An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack. Fight back In this pocket guide, the author: *Identifies terms and defines exactly what crimeware is, both intentional and unintentional; *Gives specific, up-to-date examples to help you identify the risks so that you can protect your business; *Explores the increasing use of commercial off-the-shelf (COTS) hacking tools, exposing the enemy's tactics; *Gives practical suggestions of active defence, so you can fight back; *Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business. An Introduction to Hacking And Crimeware will equip you with the vital information you need to deal with the threats presented by hacking and crimeware in all their many forms, safeguard your online information, and potentially save you and your business from very real danger.
Today, computation is an essential component of every technology. However, there has not been much research on quantum computing, even though it has the capability to solve complex problems in an efficient way. Further study is required to fully understand the uses and benefits of this technology. The Handbook of Research on Quantum Computing for Smart Environments presents investigating physical realizations of quantum computers, encoders, and decoders, including photonic quantum realization, cavity quantum electrodynamics, and many more topics on Bits to Qubits. Covering key topics such as machine learning, software, quantum algorithms, and neural networks, this major reference work is ideal for engineers, computer scientists, physicists, mathematicians, researchers, academicians, scholars, practitioners, instructors, and students.
Databases are often viewed as the end product rather than as a tool in the work place. This book has been written to address this need, using straightforward examples and assessing different ways of storing information. It is a practical guide to collecting data and using Microsoft Access to transform it into useful information. Written for both Business Studies students and professionals, it adopts a functional approach which teaches theory by practical example. 'Jargon buster' sidebars explain the terminology related to database theory, while the revision questions at the end of each unit aid comprehension. This straightforward approach means that the text is ideal for self-study. |
![]() ![]() You may like...
|