|
|
Books > Computing & IT > General
In the 21st century, intangible resources such as knowledge and
social capital have become as necessary to the modern economy as
coal, diamonds, and oil were to the past. This shift from
product-focused to service-focused economies necessitates a drastic
re-thinking of the ways in which we support the mission and
business of economic development on a global, regional, and
national scale. In order to effect and sustain a positive change,
innovation and knowledge networks need to be connected to every
aspect of life, from the private and domestic, to the corporate and
the global. This book integrates a wide variety of perspectives and
treatises on mutually adaptive and complementary processes of
knowledge generation, diffusion, and transfer within organizations
and industry, addressing both the "what" and "how to" questions of
knowledge management in a conceptual as well as an applied manner.
It should be of strong interest to science and technology policy
makers, research and development managers, business decision
makers, and students of innovation and knowledge dynamics alike.
This title presents the systematization and description of
accumulated knowledge on oceanic fronts of the Norwegian,
Greenland, Barents and Bering Seas. The main fronts of the
Norwegian, Greenland and Barents Seas are part of the climatic
North Polar Frontal Zone (NPFZ). The work is based on numerous
observational data, collected by the authors during special sea
experiments directed at the investigation of physical processes and
phenomena inside certain parts of the NPFZ and in the northern part
of the Bering Sea, on archive data of the USSR Hydrometeocenter and
other research institutions, as well as on a wide scientific
literature published in Russian and Western editions.
The book contains general information on the oceanic fronts of the
Subarctic Seas, brief history of their investigation, state of the
knowledge, as well as detailed description of the thermohaline
structure of all frontal zones in the Norwegian, Greenland, Barents
and Bering Seas and of neighboring fronts of Arctic and coastal
origin. Special attention is given to the study of the multifrontal
character of the NPFZ and of peculiarities of its internal
structure at different locations, to the description of diverse
oceanic features observed in the NPFZ, as well as to some
characteristics of the horizontal and vertical fine structure of
hydrophysical fields in the NPFZ. The main features of the northern
Bering Sea's summer ecohydrodynamics are investigated with the help
of three-dimensional direct and inverse models.
Keep track of your online passwords in this gorgeous,
alphabetically tabbed notebook featuring a modern floral design. In
this 4 × 5.75–inch, 128-page hardcover notebook with
removable cover band, record the necessarily complex passwords and
user login names required to thwart hackers. You’ll find: Â
Internet password safety and naming tips A to Z tabbed pages with
space to list website, username, and five passwords for each
Dedicated pages to record software license information, with spaces
for license number, purchase date, renewal date, and monthly fee
Dedicated pages to record network settings and passwords, including
for modem, router, WAN, LAN, and wireless A notes section with
blank lined pages Just say “no†to piles of sticky notes and
scraps of paper with your passwords and logins! This internet
password logbook provides an easy way to keep track of website
addresses, usernames, and passwords in one discreet and convenient
location.
In recent decades, computing has undergone rapid evolutions and
ground breaking developments that affect almost every sector across
the world. The developments of quantum computing and quantum
cryptography are similarly revolutionizing computing and security
with lasting impacts and implications. Quantum computing and
quantum cryptography will pave the path for new opportunities for
the future of computing. Quantum Computing and Quantum Cryptography
in Future Computers discusses quantum computing and quantum
cryptography principles and their impact on future computers. It
includes coverage of the role of quantum computing to overcome the
issues of current security methods. It also discusses the
application of quantum computing in various areas like security,
blockchain and more. Covering topics such as attack detection,
machine learning, and quantum key distribution, this premier
reference source is an ideal resource for developers, engineers,
practitioners, security experts, students and educators of higher
education, librarians, researchers, and academicians.
On-line analytical processing (OLAP) is clearly a new approach
to information system technology--offering a much-needed way to
make informed decisions better and faster. One of its most
important characteristics is multidimensional analysis--analysis
that goes beyond the conventional two-dimensional analysis and
provides users with rapid retrieval of data from organizational
databases, data warehouses, or both. Not only that, but most
importantly, says Dr. Thierauf, it allows users to look at
different dimensions of the same data, thus enabling them to do
analyses across departmental and even corporate boundaries. How it
works and OLAP's many benefits to aid users in the public and
private sectors is spelled out here, comprehensively yet concisely,
and with the author's customary well-developed examples and clear
prose. His book will be important reading for people at all levels
of management and in all types of organizations.
Another way of viewing OLAP is getting a typical company out of
the custom-report-writing business and into the data-cube-server
building business. An OLAP data structure can be thought of as a
Rubik's Cube of data that users can twist and twirl in different
ways to work through what-if and what-happened scenerios to get at
the "whys" of the situation. Within an OLAP environment, the focus
is on performing dictionary definition and maintenance as well as
mapping flat files or relational columns to dimensions and
measures. Although this may sound like a lot of work, managing one
data cube is more efficient than writing a number of custom
reports. Currently, some vendors provide administrative tools to
get the data into the cubes in the first place, in the proper form,
and on a regular basis. Hence, the job of managing data has been
simplified for users.
The complex world of online piracy and peer-to-peer file sharing is
skillfully condensed into an easy-to-understand guide that provides
insight into the criminal justice approach to illegal file sharing,
while offering guidance to parents and students who have concerns
about potential legal action in response to file-sharing
activities. While the actual impact of digital piracy is nearly
impossible to precisely calculate, the threat of financial damage
from illegal peer-to-peer (P2P) file sharing to the world's
highest-grossing entertainment firms (and even entire industries!)
has garnered attention from government, industry, and academic
leaders and criminal justice professionals. Oftentimes, those
providing access to computers and file sharing
capabilities-parents, schools, libraries-don't know about or
understand these activities and, therefore, put themselves and
their families at risk for criminal and civil prosecution. This
work describes the technological, legal, social, and ethical facets
of illegal peer-to-peer file sharing. Geared toward parents,
teachers, librarians, students, and any other computer user engaged
in file sharing, this book will help readers to understand all
forms of traditional and digital copyright violations of protected
music, movies, and software. To date over 18,000 P2P users have
been sued by the Recording Industry Association of America (RIAA).
Most of these users have been college students and parents of
high-school students. While word of these law suits are spreading,
and many parents fear that their children may be using a family
computer to illegally download and share copyrighted works, few
supervising adults have the technical knowledge needed to determine
whether and to what extent pirating may be occurring via a computer
and Internet connection they are legally responsible for.
Additionally, while P2P networks are filled with millions of users
with billions of copyrighted files, few users understand the ways
in which they are illegally using computers and other mobile
electronic devices to download protected content. While describing
both technical and social issues, this book primarily focuses on
the social aspects of illegal file sharing, and provides technical
concepts at a general level. Fisk skillfully condenses the complex
nature of file sharing systems into an easy-to-understand guide,
provides insight into the criminal justice approach to illegal file
sharing, and offers guidance to parents and students who have
concerns about potential legal action in response to file sharing
activities.
Stunning advances in digital technology have given us a new wave of
disarmingly human-like AI systems. Chatbots like ChatGPT, Claude and
Gemini put the knowledge of all the world’s experts at our fingertips,
and can generate meaningful sentences, equations and computer code. The
march of this new technology is set to upturn our economies, challenge
our democracies, and refashion society in unpredictable ways. We can
expect these AI systems to soon be making autonomous decisions on the
user’s behalf, with transformative impact on everything we do. It is
vital we understand how they work. Can AI systems ‘think’, ‘know’ and
‘understand’? Could they manipulate or deceive you, and if so, what
might they make you do? Whose interests do they ultimately represent?
And when will they be able to move beyond words and take actions for
themselves in the real world?
To answer these questions, neuroscientist and AI researcher Christopher
Summerfield explains how these strange new minds work. He charts the
evolution of AI, from the earliest inklings about thinking machines in
the seventeenth century to today’s gargantuan deep neural networks. The
resulting book is the most accessible, up-to-date and authoritative
exploration of this radical new technology. Ultimately, armed with an
understanding of AI’s mysterious inner workings, we can begin to
grapple with the existential question of our age: can we look forward
to a technological utopia, or are we in the process of writing
ourselves out of history?
There are today no more compelling sets of crime and security
threats facing nations, communities, organizations, groups,
families and individuals than those encompassed by cybercrime. For
over fifty years crime enabled by computing and telecommunications
technologies have increasingly threatened societies as they have
become reliant on information systems for sustaining modernized
living. Cybercrime is not a new phenomenon, rather an evolving one
with respect to adoption of information technology (IT) for abusive
and criminal purposes. Further, by virtue of the myriad ways in
which IT is abused, it represents a technological shift in the
nature of crime rather than a new form of criminal behavior. In
other words, the nature of crime and its impacts on society are
changing to the extent computers and other forms of IT are used for
illicit purposes. Understanding the subject, then, is imperative to
combatting it and to addressing it at various levels.
This work is the first comprehensive encyclopedia to address
cybercrime. Topical articles address all key areas of concern and
specifically those having to with: terminology, definitions and
social constructs of crime; national infrastructure security
vulnerabilities and capabilities; types of attacks to computers and
information systems; computer abusers and cybercriminals;
criminological, sociological, psychological and technological
theoretical underpinnings of cybercrime; social and economic
impacts of crime enabled with information technology (IT) inclusive
of harms experienced by victims of cybercrimes and computer abuse;
emerging and controversial issues such as online pornography, the
computer hacking subculture and potential negative effects of
electronic gaming and so-called computer addiction; bodies and
specific examples of U.S. federal laws and regulations that help to
prevent cybercrimes; examples and perspectives of law enforcement,
regulatory and professional member associations concerned about
cybercrime and its impacts; and computer forensics as well as
general investigation/prosecution of high tech crimes and attendant
challenges within the United States and internationally.
|
You may like...
Nexus
Yuval Noah Harari
Paperback
R345
R308
Discovery Miles 3 080
|