![]() |
![]() |
Your cart is empty |
||
A must-have, full-color guide to the Nikon D7100 The Nikon D7100 is an ideal camera for beginning photographers who may lack structured photography training but are still eager and determined to take great photos. And that?s where this fun-and-friendly guide comes in handy! Packed with more than 300 full-color photos, this introductory guide begins by helping you get a feel for the camera, get comfortable shooting in auto mode, managing playback options, and handle basic troubleshooting strategies. Veteran author Julie Adair King walks you through the D7100's features and encourages you to take creative control so that you can start capturing stunning pictures immediately. * Packs in more than 300 full-color photos that exemplify the basic photo skills needed to get great shots * Shares a wealth of information from one of the most popular digital photography authors * Walks you through adjusting manual settings to get better results from exposure, lighting, focus, and color * Contains an entire chapter on video mode * Explains how to send images to a computer for organizing, editing, and sharing Nikon D7100 For Dummies helps you get a grasp on your camera's controls so you can start taking memorable photos today!
Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.
Examining the consequences of technology-driven lifestyles for both crime commission and victimization, this comprehensive Handbook provides an overview of a broad array of techno-crimes as well as exploring critical issues concerning the criminal justice system's response to technology-facilitated criminal activity. The Handbook adopts a unique three-fold typology of technology-enabled crime: techno-crime committed by professional criminals (crime as work), techno-crime committed in traditional workplace settings (crime at work), and techno-crime committed by individuals outside of traditional workplace settings (crime after work.) Chapters explore an extensive range of criminal activities facilitated by the digital age, from embezzlement, financial fraud, corporate espionage, phishing, and ransomware to identity theft, hacking, cyber terrorism, and internet sex and hate crimes. Looking to the future, the Handbook considers timely questions posed by our continued reliance on information technology, including whether we are in danger of becoming a global surveillance state and how we might prevent the facilitation of cyber terrorism by social media giants. This dynamic Handbook will be an invaluable resource for scholars and students interested in criminology, digital sociology, terrorism and security, and surveillance studies. Offering practical insights on the need for a coordinated global techno-crime control strategy, it will serve as a resource for policymakers seeking cutting edge solutions to the growing problem of techno-crime.
This comprehensive Handbook offers an overview of current research on the use of social media within the tourism industry, investigating a range of social media practices and proposing strategies to address key challenges faced by tourist destinations and operators. International contributors analyse both conceptual and practical social media topics, addressing cutting-edge social media issues in destination management and marketing. Drawing on empirical case studies and examples, chapters explore dark tourism, gastro-tourism, travel blogs, electronic word-of-mouth, sentiment analysis and a variety of quantitative and qualitative methodologies. The Handbook also defines central social media concepts and explores the impact they have on the success of tourist destinations, setting the stage for a better understanding of the relationship between social media and tourism. Through an examination of current trends in social media, as well as future trajectories, it provides critical insights for the successful development and implementation of social media marketing strategies. This Handbook will be a critical read for scholars and students of geography and business management, with a specific interest in tourism and hospitality management. Its practical considerations will also be beneficial for planners, policy makers, managers and marketers in the tourism industry.
Delving deep into the emerging international and federal statutory and legislative developments surrounding Autonomous Vehicle (AV) technologies, Atilla Kasap assesses whether current motor vehicle regulations, liability law and the liability insurance system are fit for purpose today and in the future. Making a significant and novel contribution to the field, this cutting-edge book comprehensively surveys the promises offered by AVs, including radically reduced road incidents, and economic, environmental and societal benefits, alongside the significant regulatory and liability problems the technology faces. Kasap finds that, as AVs are one of the most significant and profound technological advances of the 21st century, relying on machine learning and pattern recognition systems to function, the current liability regime surrounding them requires a rethinking. Critically analysing the tort liability of AVs, chapters deconstruct and reconstruct a tort law regime for AVs, ultimately solving how policymakers should approach the challenges faced in regulating and enacting AV legislation. Interdisciplinary in approach, it will prove invaluable to students and scholars of computer science and law, particularly those studying AI and robotics law, and those interested in the regulation and governance of AV technology. It also offers vital tools for policymakers seeking concrete principles on which to define potential laws and regulations for AV technology.
Data Ethics of Power takes a reflective and fresh look at the ethical implications of transforming everyday life and the world through the effortless, costless, and seamless accumulation of extra layers of data. By shedding light on the constant tensions that exist between ethical principles and the interests invested in this socio-technical transformation, the book bridges the theory and practice divide in the study of the power dynamics that underpin these processes of the digitalization of the world. Gry Hasselbalch expertly draws on nearly two decades of experience in the field, and key literature, to advance a better understanding of the challenges faced by big data and AI developers. She provides an innovative ethical framework for studying and governing Big-Data and Artificial Intelligence. Offering both a historical account and a theoretical analysis of power dynamics and their ethical implications, as well as incisive ideas to guide future research and governance practices, the book makes a significant contribution to the establishment of an emerging data and AI ethics discipline. This timely book is a must-read for scholars studying AI, data, and technology ethics. Policymakers in the regulatory, governance, public administration, and management sectors will find the practical proposals for a human-centric approach to big data and AI to be a valuable resource for revising and developing future policies.
This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives. Providing an excellent in-depth analysis of global privacy and data protection law, it explores multiple regional and national jurisdictions, bringing together interdisciplinary international contributions from Europe and beyond. Chapters cover critical topics in the field, including key features of the General Data Protection Regulation (GDPR), border surveillance, big data, artificial intelligence, and biometrics. It also investigates the relationship between privacy and data protection law and other fields of law, such as consumer law and competition law. With its detailed exploration and insights into privacy and data protection, this Research Handbook will prove a useful resource for information and media law students as well as academics researching fields such as data protection and privacy law and surveillance or security studies.
Understand microgrids and networked microgrid systems Microgrids are interconnected groups of energy sources that operate together, capable of connecting with a larger grid or operating independently as needed and network conditions require. They can be valuable sources of energy for geographically circumscribed areas with highly targeted energy needs, and for remote or rural areas where continuous connection with a larger grid is difficult. Microgrids' controllability makes them especially effective at incorporating renewable energy sources. Microgrids: Theory and Practice introduces readers to the analysis, design, and operation of microgrids and larger networked systems that integrate them. It brings to bear both cutting-edge research into microgrid technology and years of industry experience in designing and operating microgrids. Its discussions of core subjects such as microgrid modeling, control, and optimization make it an essential short treatment, valuable for both academic and industrial study. Readers will acquire the skills needed to address existing problems and meet new ones as this crucial area of power engineering develops. Microgrids: Theory and Practice also features: Incorporation of new cyber-physical system technologies for enabling microgrids as resiliency resources Theoretical treatment of a wide range of subjects including smart programmable microgrids, distributed and asynchronous optimization for microgrid dispatch, and AI-assisted microgrid protection Practical discussion of real-time microgrids simulations, hybrid microgrid design, transition to renewable microgrid networks, and more Microgrids: Theory and Practice is ideal as a textbook for graduate and advanced undergraduate courses in power engineering programs, and a valuable reference for power industry professionals looking to address the challenges posed by microgrids in their work.
Originating from papers presented at the 18th International Conference on Railway Engineering Design and Operation, this book provides up-to-date research on the use of advanced systems, promoting their general awareness throughout the management, design, manufacture and operation of railways and other emerging passenger, freight and transit systems. A key emphasis is placed on the use of computer systems in advanced railway engineering. The included works are compiled from a variety of specialists interested in the development of railways, including managers, consultants, railway engineers, designers of advanced train control systems and computer specialists. Topics covered include: Traffic safety, security and monitoring; Train and railways analysis; Operation of rail networks; Advanced train control; Energy-efficient design; Traffic modelling and simulation.
A vital perspective is missing from the discussions we're having about
Artificial Intelligence: what does it mean for our identity?
For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft (R) Office. Best-selling Technology in Action Complete uses practical content and hands- on projects to engage students in computing tasks and skills they can apply at work, in class, or at home. Designed for today's technically savvy students, the text introduces difficult concepts at a basic level early on, then expands upon these skills as students build mastery. The 16th edition brings innovative content updates, including new coverage of ethics, artificial intelligence, and managing a digital lifestyle, as well as several new features encouraging critical thinking.
In this book, I am going to show you everything you need to know:
Hone your advanced Excel 2016 skills. And earn the credential that proves it! Demonstrate your expertise with Microsoft Excel! Designed to help you practice and prepare for Microsoft Office Specialist (MOS): Excel Expert 2016 certification, this official Study Guide delivers: In-depth preparation for each MOS objective Detailed procedures to help build the skills measured by the exam Hands-on tasks to practice what you've learned Ready-made practice files Sharpen the skills measured by these objectives: Create and Manage Workbooks Apply Custom Formatting and Layouts Create Advanced Formulas Perform Data Analysis Create Advanced Charts and PivotTables
Autonomous systems are on the frontiers of Artificial Intelligence (AI) research, and they are slowly finding their business applications. Driven mostly by Reinforcement Learning (RL) methods (one of the most difficult, but also the most promising modern AI algorithms), autonomous systems help create self-learning and self-optimising systems, ranging from simple game-playing agents to robots able to efficiently act in completely new environments. Based on in-depth study of more than 100 projects, Andrzej Wodecki explores RL as a key component of modern digital technologies, its real-life applications to activities in a value chain and the ways in which it impacts different industries. Artificial Intelligence in Management will help project leaders, decision makers and investors evaluate new autonomous projects and will serve as an inspiring guide for future research.
This comprehensive book provides a detailed survey and practical examination of a wide range of legal and regulatory topics in HealthTech. Combining the insights of leading healthcare experts from around the world, chapters first examine the key characteristics, use cases and regulation in the field, before turning to the development and potential applications of cutting-edge technologies in healthcare. The book also addresses the main issues involved in setting up and running a HealthTech business, highlighting the vital role this will play in developing the technologies and skill sets required for the future of the sector. Key features include: analysis of the impact of emerging innovations on the accessibility, efficiency and quality of healthcare and its effects on healthcare providers examination of artificial intelligence, blockchain and digital identity applications in healthcare, alongside associated regulatory challenges guidance on the financial requirements of healthcare start-ups at different stages of growth and various collaboration and partnership models in the HealthTech market discussion of the major regulatory questions affecting the HealthTech industry, from data protection, public procurement and product liability, to the regulation of medical devices, intellectual property and advertising. HealthTech: Law and Regulation will be an invaluable resource for both in-house lawyers in the healthcare and pharmaceutical sectors, as well as those working for law firms practising in these areas. It will also be of interest to academics and students teaching or researching in healthcare law.
Library research has changed dramatically since Marilyn Lutzker and Eleanor Ferrall's Criminal Justice Research in Libraries was published in 1986. In addition to covering the enduring elements of traditional research, this new edition provides full coverage of research using the World Wide Web, hypertext documents, computer indexes, and other online resources. It gives an in-depth explanation of such concepts as databases, networks, and full text, and the Internet gets a full chapter. The chapters on bibliographic searching, the library catalog, and comparative research are almost totally new, and chapters on indexes and abstracts, newsletters, newspapers and news broadcasts, documents, reports and conference proceedings, and statistics reflect the shift to computerized sources. The chapter on legal resources discusses the wealth of legal information available on the Internet. A new chapter on library research in forensic science corrects an omission from the first book. With the growth of computerized indexes and the Internet, more and more researchers are admitting that they feel inadequate to the new tools. Librarians themselves are struggling to keep abreast of the new technology. This book will help students, practitioners, scholars, and librarians develop a sense of competency in doing criminal justice research.
Crypto is red-hot right now.
The Future of Copyright in the Age of Artificial Intelligence offers an extensive analysis of intellectual property and authorship theories and explores the possible impact artificial intelligence might have on those theories. The author makes compelling arguments via the exploration of authorship, ownership and artificial intelligence. First, the book advocates for a more holistic approach to authorship, arguing that there is no good reason to exclude computer-generated and artificial intelligence creations from copyright. Second, it conducts an open search for the right 'candidate' for ownership. In doing so, the book explores several possible legal frameworks, including assigning ownership to the programmer, the user, the AI itself and other alternatives such as the public domain or author-in-law approaches. Third, the book explores the concept of artificial intelligence as it has developed through the years in various fields, seeking to reframe the AI legal concept. For academic scholars and law students these pages frame the theoretical discussion about artificial intelligence creations and provide in depth discussion about artificial intelligence legal challenges.
In this classic of travel writing, first published sixty years ago, a Danish journalist records his experience of life in North Africa under colonial rule. Driving through the Sahara in a battered Chevrolet, having converted to Islam and with a knowledge of Arabic, he leaves the beaten track to discover communities and landscapes shrouded in mystery for centuries. Brushes with magicians, cave-dwellers and Sufi mystics, however, prove less astonishing than the cruelties inflicted on the local populations by Mussolini's generals.
Host of public television's Mark Kistler's Imagination Station, shows young artists the cool and fun way to draw in 3-D! Hey, you! Open this book and learn how to draw in three dimensions! Mark Kistler's Imagination Station has thirty-six exciting drawing adventures. Mark teaches you the different skills you need in order to create such masterpieces as: * Dinosaurs in the Sky There's also a special guide for parents and teachers at the end of the book.
This groundbreaking book explores the new legal and economic challenges triggered by big data, and analyses the interactions among and between intellectual property, competition law, free speech, privacy and other fundamental rights vis-a-vis big data analysis and algorithms. Offering both theoretical and practical insights, contributions illustrate the disruptive nature of the data-driven economy. Chapters discuss how products and services are digitalised and broken into bits, that in turn are reassembled, traded and used across sectors and borders, in contrast to how algorithms are already used to influence our choices, govern our news feeds and revolutionise business models at large. Having shown algorithms and big data to be the two fundamental driving forces of the new information society, expert authors explore which policy options, institutional frameworks and values should be adopted by lawmakers and regulatory authorities in order to ensure a fair balance between private interests such as competition, innovation and the fundamental rights of individuals. Innovatively combining both public and private law perspectives, this unique book will provide a valuable resource for scholars and students of information and technology law, media law, privacy, regulatory and human rights law. Its attention to the latest developments will also prove essential for policymakers and practitioners working in related areas.
Affective computing is a nascent field situated at the intersection of artificial intelligence with social and behavioral science. It studies how human emotions are perceived and expressed, which then informs the design of intelligent agents and systems that can either mimic this behavior to improve their intelligence or incorporate such knowledge to effectively understand and communicate with their human collaborators. Affective computing research has recently seen significant advances and is making a critical transformation from exploratory studies to real-world applications in the emerging research area known as applied affective computing. This book offers readers an overview of the state-of-the-art and emerging themes in affective computing, including a comprehensive review of the existing approaches to affective computing systems and social signal processing. It provides in-depth case studies of applied affective computing in various domains, such as social robotics and mental well-being. It also addresses ethical concerns related to affective computing and how to prevent misuse of the technology in research and applications. Further, this book identifies future directions for the field and summarizes a set of guidelines for developing next-generation affective computing systems that are effective, safe, and human-centered. For researchers and practitioners new to affective computing, this book will serve as an introduction to the field to help them in identifying new research topics or developing novel applications. For more experienced researchers and practitioners, the discussions in this book provide guidance for adopting a human-centered design and development approach to advance affective computing.
|
![]() ![]() You may like...
Business, Technological, and Social…
Maria Manuela Cruz Cunha, Vitor Hugo Costa Carvalho, …
Hardcover
R5,078
Discovery Miles 50 780
Digital Communication Systems…
Alexander M. Wyglinski, Di Pu
Hardcover
R3,597
Discovery Miles 35 970
Monte Carlo Statistical Methods
Christian Robert, George Casella
Hardcover
R5,077
Discovery Miles 50 770
Discrete Choice Analysis with R
Antonio Paez, Genevieve Boisjoly
Hardcover
R3,552
Discovery Miles 35 520
|