|
|
Books > Computing & IT > General
Written for professionals looking to build data science and
analytics capabilities within their organizations as well as those
who wish to expand their knowledge and advance their careers in the
data space Shows how to build a fit-for-purpose data science
capability in a manner that avoids the most common pitfalls Most
data strategy works 'top-down' by providing technical solutions to
perceived organizational needs. This book uses emergent design, an
evolutionary approach that increases the chances of successful
outcomes while minimising upfront investment
This textbook offers an accessible introduction to the historical,
technical, and strategic context of global cyber conflict. The
second edition has been revised and updated throughout, with three
new chapters. Cyber warfare involves issues of doctrine, strategy,
policy, international relations (IR) and operational practice
associated with computer network attack, computer network
exploitation and computer network defense. However, it is conducted
within complex sociopolitical settings alongside related forms of
digital contestation. This book provides students with a
comprehensive perspective on the technical, strategic and policy
issues associated with cyber conflict, as well as an introduction
to key state and non-state actors. Specifically, the book provides
a comprehensive overview of several key issue areas: The historical
context of the emergence and evolution of cyber warfare, including
the basic characteristics and methods of computer network attack,
exploitation and defense An interdisciplinary set of theoretical
perspectives on conflict in the digital age from the point of view
of the fields of IR, security studies, psychology and science,
technology and society (STS) studies Current national perspectives,
policies, doctrines and strategies relevant to cyber warfare An
examination of key challenges in international law, norm
development and deterrence; and The role of emerging information
technologies like artificial intelligence and quantum computing in
shaping the dynamics of global cyber conflict This textbook will be
essential reading for students of cybersecurity/cyber conflict and
information warfare, and highly recommended for students of
intelligence studies, security and strategic studies, defense
policy, and IR in general.
Learn the ins and outs of the IT security field and efficiently
prepare for the CompTIA Security+ Exam SY0-601 with one
easy-to-follow resource CompTIA Security+ Review Guide: Exam
SY0-601, Fifth Edition helps you to efficiently review for the
leading IT security certification—CompTIA Security+ SY0-601.
Accomplished author and security expert James Michael Stewart
covers each domain in a straightforward and practical way, ensuring
that you grasp and understand the objectives as quickly as
possible. Whether you’re refreshing your knowledge or doing a
last-minute review right before taking the exam, this guide
includes access to a companion online test bank that offers
hundreds of practice questions, flashcards, and glossary terms.
Covering all five domains tested by Exam SY0-601, this guide
reviews: Attacks, Threats, and Vulnerabilities Architecture and
Design Implementation Operations and Incident Response Governance,
Risk, and Compliance This newly updated Fifth Edition of CompTIA
Security+ Review Guide: Exam SY0-601 is not just perfect for anyone
hoping to take the SY0-601 Exam, but it is also an excellent
resource for those wondering about entering the IT security field.
This book looks at the history of computing in education from two
points of view - as a history of the impact of computing on
education over the past forty years and as the use of the history
of computing as a pedagogical tool in computing education. These
two intertwined views look back at computer education and the ways
in which organizations have attempted to use computers to enhance
teaching and learning from elementary education through university
studies in several countries. The topics include: considerations of
cybernetics and informatics; government sponsored open source
software for school education; learning with the artificial
sciences; technology leading to historic changes; ICT in Catalan
schools; streams in the history of computer education in Australia;
growth of computing technology for education in India; computing
and education in the UK; evolution of e-inclusion for the disabled;
educational hypermedia computing; keyboard training; studies of
educational computing projects; and using computing history to
enhance teaching. History of Computing in Education is unique in
its topic, the field having not been the subject of extensive study
in the past. the impact of computing on education is only now
receiving due attention. This book derives from contributions made
at the History of Computing in Education conference at the IFIP
18th World Computer Congress, held in August 2004 in Toulouse,
France and sponsored by the International Federation for
Information Processing (IFIP). Teachers, students, researchers,
authors, and education developers should find this work as a
welcome addition to their educational repertoire. It will also
provide new dimensions of breadth and depth in the evolution of
computing in education.
From the former news policy lead at Google, an “informative and
often harrowing wake-up call†(Publishers Weekly) that explains
the high-stakes global cyberwar brewing between Western democracies
and the authoritarian regimes of China and Russia that could
potentially crush democracy. From 2016 to 2020, Jacob Helberg led
Google’s global internal product policy efforts to combat
disinformation and foreign interference. During this time, he found
himself in the midst of what can only be described as a quickly
escalating two-front technology cold war between democracy and
autocracy. On the front-end, we’re fighting to control the
software—applications, news information, social media platforms,
and more—of what we see on the screens of our computers, tablets,
and phones, a clash which started out primarily with Russia but now
increasingly includes China and Iran. Even more ominously, we’re
also engaged in a hidden back-end battle—largely with China—to
control the internet’s hardware, which includes devices like
cellular phones, satellites, fiber-optic cables, and 5G networks.
This tech-fueled war will shape the world’s balance of power for
the coming century as autocracies exploit 21st-century methods to
redivide the world into 20th-century-style spheres of influence.
Without a firm partnership with the government, Silicon Valley is
unable to protect democracy from the autocrats looking to sabotage
it from Beijing to Moscow and Tehran. Helberg offers “unnervingly
convincing evidence that time is running out in the ‘gray war’
with the enemies of freedom†(Kirkus Reviews) which could affect
every meaningful aspect of our lives, including our economy, our
infrastructure, our national security, and ultimately, our national
sovereignty.
In a significant contribution to the study of the brain and
behavior, Coward develops a system model for the human brain based
on a new physiologically based theory of learning and memory. The
work is primarily intended for neuropsychologists, but will be of
interest to anyone concerned with understanding the brain as a
functioning system. The author has twenty years' experience in most
of the different aspects of designing complex electronic systems.
Such a system today has up to several billion hardware components
such as individual transistors, and millions of lines of software.
Coward argues that the methodology used to handle the design of
such systems can be modified and adapted to understand the brain.
In the design of electronic systems, the concept instruction makes
it possible to rigorously translate from high level operational
descriptions to detailed descriptions in terms of machine code and
transistor structures. In the brain, the concept pattern can make
it possible to translate between the descriptions of psychology and
physiology and make functional understanding possible. Any change
in the state of a neuron can be interpreted on a system level as
the recognition of a pattern. Pattern is precisely defined and
includes both objects and changes to objects. Based on these
observations, Coward designs a model called the cascaded pattern
extraction hierarchy to explain the functioning of the brain,
showing that the brain can be visualized as a pattern extraction
template, in which successive layers are able to extract
increasingly complex patterns from relatively simple input.
Coward demonstrates that as a pattern extraction template, the
brain forms a hierarchy in connectivity space. Early layers--those
closest to sensory input--can be interpreted as extracting patterns
from simple sensory input. Later layers generate action
recommendations, and later still, they select actions, all within
the same pattern extraction paradigm. According to the model, the
firing of a neuron at these points constitutes both pattern
recognition and action recommendation. Coward's system model not
only provides a framework for understanding and predicting
psychological phenomena, including the functioning of personality,
but also accounts for such apparent anomalies as the difference
between short and long term memory and the fact that localized
brain damage does not remove the memory of individual events.
Widely useful for studies of brain and behavior, Pattern Thinking
also suggests how to identify promising areas to investigate in the
treatment of psychological illnesses.
This is the 3rd volume of Advances in Telecommunication Management,
focusing on Information Technology and Crisis Management.
The Middle Ages have provided rich source material for physical and
digital games from Dungeons and Dragons to Assassin’s Creed. This
volume addresses the many ways in which different formats and genre
of games represent the period. It considers the restrictions placed
on these representations by the mechanical and gameplay
requirements of the medium and by audience expectations of these
products and the period., highlighting innovative attempts to
overcome these limitations through game design and play. Playing
the Middle Ages considers a number of important and timely issues
within the field including: one, the connection between medieval
games and political nationalistic rhetoric; two, trends in the
presentation of religion, warfare and other aspects of medieval
society and their connection to modern culture; three, the
problematic representations of race; and four, the place of gender
and sexuality within these games and the broader gaming community.
The book draws on the experience of a wide-ranging and
international group of academics across disciplines and from games
designers. Through this combination of expertise, it provides a
unique perspective on the representation of the Middle Ages in
modern games and drives key discussions in the fields of history
and game design.
This book offers a comprehensive analysis of the variety of tools
and techniques used today for the design and modeling of efficient
and robust swarm-intelligence based systems: highly (or fully)
decentralized, semi-autonomous, highly-scalable infrastructures in
various real-life scenarios. Among others, the book reviews the use
of the swarm intelligence paradigm in financial investment,
blockchain protocols design, shared transportation systems,
communication networks, and military applications. Theoretical and
practical limitations of such systems are discussed, as well as
trade-offs between the various economic and operational parameters
of the systems. The book is intended for researchers and engineers
in the fields of swarms systems, economics and operation research.
Key Features • Explains, in a detailed and clear way, the
mathematical principles behind swarm intelligence • Illustrates
how swarm intelligence can be used in real-world systems •
Reviews leading state-of-the-art approaches in the design and
modeling of swarm systems today
Purchasing and Financial Management of Information Technology aims
to significantly reduce the amount of money wasted on IT by
providing readers with a comprehensive guide to all aspects of
planning, managing and controlling IT purchasing and finance.
Starting from a recognition that IT purchasing and the financial
management often needs to be treated differently from other types
of expenditure, the author draws on over 25 years of experience in
the field to provide readers with useful mixture of good procedures
and common sense rules that have been tried, tested and found to
work. Many of these are illustrated by case histories, each with a
moral or a lesson. Purchasing and Financial Management of
Information Technology provides useful guidelines and advice on
whole range of topics including: * IT acquisitions policy * Dealing
with suppliers * Budgeting and cost control * IT cost and risk
management * Specification, selection and evaluation of systems *
IT value for money
IT Performance Management addresses the way organizations should
balance the demand and the supply of information technology,
optimizing the cost and maximizing the business value of IT.
In this book several aspects of IT performance management are
described. The way this management is executed and the techniques,
which should be used, depend on the maturity of the relationship
between the IT function and the lines of business of an
organization. The foundation of the authors' approach is based on
the flow of money and related management objectives. However,
performance management is primarily based on perceptions.
Therefore, this book introduces the IT value perception model. This
model describes four separate levels of perception for the business
value of IT. If the demand and the supply of IT do not share the
same perception level, the balance is lost, which will lead to
friction and inefficiency within an organization.
This book is not about what is good or what is bad, but rather is
about the 'what', the 'why' and to a limited extent the 'how' of
managing the performance of IT. Therefore, the book finishes with a
'back-to-business' section in which a self-assessment checklist, a
potential growth path and ten next steps are provided. This enables
the reader to start applying this book in his every day working
environment immediately.
IT Performance Management:
* Provides an overview of best practices and available thinking on
the subject of IT cost and value
* Describes the subject of IT cost and value related to management
issues on IT strategy, portfolio management, service management,
architecture and sourcing
* Addresses differing degrees of maturitybetween IT and the
business, illustrated by case studies
Practical and easy to integrate into day to day decision making
immediately
Deals with multiple perceptions on the role of the IT organisation
in the business
Discusses the topics currently on the CIO's agenda
Recent advances in science and engineering have led to the
proliferation of cyber-physical systems. Now viewed as a pivotal
area of research, the application of CPS has expanded into several
new and innovative areas. Challenges, Opportunities, and Dimensions
of Cyber-Physical Systems explores current trends and enhancements
of CPS, highlighting the critical need for further research and
advancement in this field. Focusing on architectural fundamentals,
interdisciplinary functions, and futuristic implications, this book
is an imperative reference source for scholars, engineers, and
students in the scientific community interested in the current and
future advances in CPS.
Cases on ICT Utilization, Practice and Solutions: Tools for
Managing Day-to-Day Issues presents past, present and future
research directions within the field. This book includes cases on
the latest advances in Information Communication Technology. The
authors have provided in-depth insight into the current state of
research in ICT as well as identified successful approaches, tools
and methodologies in ICT research. They explore points of good
practices, while addressing potential pitfalls to avoid, and
examining and evaluating solutions to some of ICT researchers'
toughest challenges.
|
You may like...
Nexus
Yuval Noah Harari
Paperback
R345
R308
Discovery Miles 3 080
|