|
|
Books > Computing & IT > General theory of computing
Over a decade after Anonymous first appeared, it has grown from a
small band of hacktivists to a Global Collective with organized
National Cells in half the countries on Earth and 2.5 million
dedicated participants worldwide. Dark Ops explores four years in
the history of the global and viral meme of revolution called
Anonymous, as it continues to battle the forces of evil bent on
world domination. As NATO and the ""Five Eyes"" nations continue to
war on Anonymous, the Global Collective strikes some fearful blows
in return. Join Commander X and other Anons as they take you on a
grand adventure, and lead us all into the mysterious Dark Ops.
www.DarkOps.cf
If databases are so critical, why do they remain so vulnerable?
Save The Database, Save The World delves into the topics of
database security - from recent statistics, attack vectors, the
threat of cyberwar, and why security best practices are so rarely
followed.
Do You Want To Dominate Social Media? Have you ever wondered if
there was an exact blueprint on how to dominate social media
marketing? Do you want to grow your followers and your brand? Are
you looking to increase your online presence? When you buy Social
Media: Dominating Strategies for Social Media Marketing with
Twitter, Facebook, Youtube, LinkedIn and Instagram, your followers
and social media will start to grow rapidly! Every business owner
or marketing executive now agrees to the fact that their business
has to adapt to social media or end up losing touch with its
customers. You will discover everything you need to know about
Social Media Marketing! This book breaks training down into
easy-to-understand modules. It starts from the very beginning of
social media marketing, so you can get great results - and grow
your business!
The book systematically introduces smart power system design and
its infrastructure, platform and operating standards. It focuses on
multi-objective optimization and illustrates where the intelligence
of the system lies. With abundant project data, this book is a
practical guideline for engineers and researchers in electrical
engineering, as well as power network designers and managers in
administration.
To date, a plethora of companies and organizations are investing
vast amounts of money on the latest technologies. Information
technology can be used to improve market share, profits, sales,
competitive advantage, and customer/employee satisfaction.
Unfortunately, the individuals meant to use these technologies are
not well equipped on how to effectively and efficiently use these
tools for competitive advantage and decision making. The Handbook
of Research on IT Applications for Strategic Competitive Advantage
and Decision Making is a collection of innovative research relevant
to the methodologies, theoretical frameworks, and latest empirical
research findings in information technology applications, strategic
competitive advantage, and decision making. While highlighting
topics including agility, knowledge management, and business
intelligence, this book is ideally designed for information
technology professionals, academics, researchers, managers,
executives, and government officials interested in using
information technology for strategic competitive advantage and
better decision making.
Globalization, along with its digital and information communication
technology counterparts, including the Internet and cyberspace, may
signify a whole new era for human rights, characterized by new
tensions, challenges, and risks for human rights, as well as new
opportunities. Human Rights and Risks in the Digital Era:
Globalization and the Effects of Information Technologies explores
the emergence and evolution of digital rights that challenge and
transform more traditional legal, political, and historical
understandings of human rights. Academic and legal scholars will
explore individual, national, and international democratic
dilemmas--sparked by economic and environmental crises, media
culture, data collection, privatization, surveillance, and
security--that alter the way individuals and societies think about,
regulate, and protect rights when faced with new challenges and
threats. The book not only uncovers emerging changes in discussions
of human rights, it proposes legal remedies and public policies to
mitigate the challenges posed by new technologies and
globalization.
The evolution of soft computing applications have offered a
multitude of methodologies and techniques that are useful in
facilitating new ways to address practical and real scenarios in a
variety of fields. Exploring Innovative and Successful Applications
of Soft Computing highlights the applications and conclusions
associated with soft computing in different technological
environments. Providing potential results based on new trends in
the development of these services, this book aims to be a reference
source for researchers, practitioners, and students interested in
the most successful soft computing methods applied to recent
problems.
Advancements of information systems are rapidly altering both the
economy and society. This progression of information creates
operational and strategic advantages which is important to the
success of organizations and firms. Approaches and Processes for
Managing the Economics of Information Systems explores the value of
information and its management by highlighting theoretical and
empirical approaches in the economics of information systems. By
providing insight into how information systems can generate
economic value for businesses and consumers, this book is essential
for professors, students, researchers, and developers of
information systems.
The book will benefit a reader with a background in physical
sciences and applied mathematics interested in the mathematical
models of genetic evolution. In the first chapter, we analyze
several thought experiments based on a basic model of stochastic
evolution of a single genomic site in the presence of the factors
of random mutation, directional natural selection, and random
genetic drift. In the second chapter, we present a more advanced
theory for a large number of linked loci. In the third chapter, we
include the effect of genetic recombination into account and find
out the advantage of sexual reproduction for adaptation. These
models are useful for the evolution of a broad range of asexual and
sexual populations, including virus evolution in a host and a host
population.
Multi-Agent Applications with Evolutionary Computation and
Biologically Inspired Technologies: Intelligent Techniques for
Ubiquity and Optimization compiles numerous ongoing projects and
research efforts in the design of agents in light of recent
development in neurocognitive science and quantum physics. This
innovative collection provides readers with interdisciplinary
applications of multi-agents systems, ranging from economics to
engineering.
Recently, the event-based paradigm, a burgeoning technology
receiving attention in research as well as industry, has gained
momentum in the commercial world causing a need for further
research in the field. Principles and Applications of Distributed
Event-Based Systems showcases event-based systems in real-world
applications, providing an overview of relevant terminology and
content approachable for readers from a variety of backgrounds.
Containing expert international contributions, this advanced
publication provides professionals, researchers, and students in
systems design with a rich compendium of latest applications in the
field.
This story was totally fiction and the characters are fiction as
well. Some of the material used in this book was gleaned from
articles written about Osama Ben Laden; Afghanistan; the United
States Marine Corps; the Kennedy Assassination; the gas attack on
the Tokyo Subway system. A lot of the technical knowledge was taken
from magazine articles and articles on the Internet. A great
portion of the possible use of the computer for law enforcement was
part of the writer's imagination. It remains to be seen if a lot of
the technology mentioned in this story will come to fruition. The
advances of computer technology in the last few years have been so
astounding that it is hard to imagine what lies ahead for us. It
could become a golden age and one that can promote peace to the
world. It can be a boon to the Medical Profession as it already
has. We could be heading for a civilization where we don't have to
worry about crime or sickness or war. H G Wells wrote about time
travel. Even that is not as implausible as it once was. When the
writer was born, Space travel was talked of but no one thought that
there would ever be a modern Buck Rogers. Who ever imagined that we
would have six foot wide flat screen televisions broadcasting
events all over the world and from outer space. So the Technology
used by "Investicom" may not be so far fetched. Let's see.
The digital divide, caused by several factors such as poverty and
slow communication technologies, has offset the progression of many
developing countries. However, with rapid changes in technology, a
better collaboration among communities and governance based on the
latest research in ICT and technology has begun to emerge.
Employing Recent Technologies for Improved Digital Governance is an
essential reference source that provides research on recent
advances in the development, application, and impact of
technologies for the initiative of digital governance. The book has
a dual objective with the first objective being to encourage more
research in deploying recent trends in the internet for deploying a
collaborative digital governance. The second objective is to
explore new possibilities using internet of things (IoT) and
cloud/fog-based solutions for creating a collaboration between the
governance and IT infrastructure. Featuring research on topics such
as intelligent systems, social engineering, and cybersecurity, this
book is ideally designed for policymakers, government officials,
ICT specialists, researchers, academicians, industry professionals,
and students.
|
You may like...
Sleeper
Mike Nicol
Paperback
R300
R277
Discovery Miles 2 770
Kringloop
Bets Smith
Paperback
R270
R253
Discovery Miles 2 530
|