|
|
Books > Computing & IT > General
One of the realities characterizing the globe is the exclusion of
marginalized communities in digital transformation. Their exclusion
has resulted in a lack of participation in the digital space, which
has catastrophic consequences on the digital economy. To promote
digital inclusiveness in marginalized communities, there is a need
to deconstruct the illusion that digital transformation is an urban
phenomenon. Digital Transformation for Promoting Inclusiveness in
Marginalized Communities discusses how digital transformation can
be utilized to promote inclusiveness in marginalized communities by
exploring opportunities and challenges and determining change
mechanisms required to enhance digital transformation in
marginalized communities. Covering a range of topics such as
augmented reality and remote communities, this reference work is
ideal for government employees, technologists, policymakers,
industry professionals, researchers, scholars, academicians,
instructors, and students.
This handbook focuses on new threats to psychological security that
are posed by the malicious use of AI and how it can be used to
counteract such threats. Studies on the malicious use of AI through
deepfakes, agenda setting, sentiment analysis and affective
computing and so forth, provide a visual representation of the
various forms and methods of malicious influence on the human
psyche, and through this on the political, economic, cultural
processes, the activities of state and non-state institutions.
Separate chapters examine the malicious use of AI in geopolitical
confrontation, political campaigns, strategic deception, damage to
corporate reputation, and activities of extremist and terrorist
organizations. This is a unique volume that brings together a
multidisciplinary range of established scholars and upcoming new
researchers from 11 countries. This handbook is an invaluable
resource for students, researchers, and professionals interested in
this new and developing field of social practice and knowledge.
The book is presents the papers presented at the 4th International
Conference on Telecommunications and Communication Engineering
(ICTCE 2020) held on 4 -6 December, in Singapore. It covers
advanced research topics in the field of computer communication and
networking organized into the topics of emerging technologies of
wireless communication and networks, 5G wireless communication and
networks, information and network security, internet of things and
fog computing. These advanced research topics are taking the lead
and representing the trend of the recent academic research in the
field of computer communication and networking. It is expected that
the collection and publication of the research papers with the
advanced topics listed in this book will further promote high
standard academic research in the field and make a significant
contribution to the development of economics and human society.
With over 90 million monthly users and counting, Roblox is one of
the most popular games on the planet! The Big Book of Roblox helps
players get the most out of this dynamic sandbox game. Packed with
tips, hints, and hacks, this complete, up-to-date guide covers
basic strategy as well as advanced tricks and is essential reading
for anyone who wants to play like a pro. Topics covered include
navigation, combat, trading, and mini games—accompanied by over
100 full-color gameplay photos. Additional chapters focus on
building mode, popular in-game experiences, and even a look behind
the scenes. Take your creations to new levels and maximize the
value of your playing time with The Big Book of Roblox!
Elixir offers new paradigms, and challenges you to test in
unconventional ways. Start with ExUnit: almost everything you need
to write tests covering all levels of detail, from unit to
integration, but only if you know how to use it to the fullest -
we'll show you how. Explore testing Elixir-specific challenges such
as OTP-based modules, asynchronous code, Ecto-based applications,
and Phoenix applications. Explore new tools like Mox for mocks and
StreamData for property-based testing. Armed with this knowledge,
you can create test suites that add value to your production cycle
and guard you from regressions. Write Elixir tests that you can be
proud of. Dive into Elixir's test philosophy and gain mastery over
the terminology and concepts that underlie good tests. Create and
structure a comprehensive ExUnit test suite, starting from the
basics, and build comprehensive test coverage that will provide
safety for refactoring and confidence that your code performs as
designed. Use tests to make your software more reliable and fault
tolerant. Explore the basic tool set provided by ExUnit and Mix to
write and organize your test suite. Test code built around
different OTP functionality. Isolate your code through dependency
injection and by using Mox. Write comprehensive tests for Ecto
projects, covering Ecto as a database tool as well as a standalone
data validation tool. Test Phoenix channels from end to end,
including authentication and joining topics. Write Phoenix
controller tests and understand the concepts of integration testing
in Elixir. Learn property-based testing with StreamData from the
author who wrote the library. Code with high confidence that you
are getting the most out of your test suite, with the right tools
that make testing your code a pleasure and a valuable part of your
development cycle. What You Need: To get the most out of this book,
you will need to have installed Elixir 1.8 or later and Erlang/OTP
21 or later. In order to complete the relevant chapters, you will
also need Ecto 3.1 or later, EctoSQL 3.1 or later and Phoenix 1.3
or later.
Stopping Losses from Accidental and Malicious Actions Around the
world, users cost organizations billions of dollars due to simple
errors and malicious actions. They believe that there is some
deficiency in the users. In response, organizations believe that
they have to improve their awareness efforts and making more secure
users. This is like saying that coalmines should get healthier
canaries. The reality is that it takes a multilayered approach that
acknowledges that users will inevitably make mistakes or have
malicious intent, and the failure is in not planning for that. It
takes a holistic approach to assessing risk combined with technical
defenses and countermeasures layered with a security culture and
continuous improvement. Only with this kind of defense in depth can
organizations hope to prevent the worst of the cybersecurity
breaches and other user-initiated losses. Using lessons from tested
and proven disciplines like military kill-chain analysis,
counterterrorism analysis, industrial safety programs, and more,
Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid
provides a methodology to analyze potential losses and determine
appropriate countermeasures to implement. Minimize business
losses associated with user failings Proactively plan to prevent
and mitigate data breaches Optimize your security spending Cost
justify your security and loss reduction efforts Improve your
organization’s culture Business technology and security
professionals will benefit from the information provided by these
two well-known and influential cybersecurity speakers and experts.
This book is a continuation and deepening of Sovereign Blockchain
1.0. It mainly includes three views: 1) Blockchain is a super
public product based on digital civilization. 2) The Internet is an
advanced level of industrial civilization, the core of which is
connection; blockchain is an important symbol of digital
civilization, the essence of which is reconstruction. 3) Digital
currency will trigger a comprehensive change in the economic field,
and digital identity will reconstruct the governance model in the
social field, thereby changing the order of civilization. This book
is not only a popular science book based on blockchain thinking,
theory and application research, but also a scholarly work on the
technical and philosophical issues of governance and the future. By
reading Sovereign Blockchain 2.0, policymakers can quickly
understand the basic knowledge and frontier dynamics of science and
technology; science and technology workers can grasp the general
trend, seize opportunities, face problems and difficulties, aim at
the world's science and technology frontier and lead the direction
of science and technology development; experts and scholars in law
and legal fields can see new ideas, concepts and models of data
governance; social science researchers can discover data sociology
and data philosophy issues.
Morton Wagman examines the emulation of human cognition by
artificial intelligence systems. Human thought and computer thought
are compared in their distinctiveness and commonality. The book
provides detailed examples of artificial intelligence programs
(such as the FERMI System and the KEKADA program) accomplishing
highly intellectual tasks. This, together with its coverage of
general theoretical perspectives on the nature of cognition, make
this volume both a valuable sourcebook and a stimulus for students
and professionals in cognitive science, psychology, philosophy, and
artificial intelligence courses.
A general introduction to the computational modeling of
cognition opens the book. Considered next are computational
reasoning and human rationality. The range, depth, and sensitivity
of mathematical and legal reasoning systems are compared with human
mathematicians and human jurisprudence. General issues concerning
the quality of human rationality are examined in several contexts:
the prediction of economic behavior, mathematical abstraction and
the concept of the infintesimal, and probalilistic judgement under
uncertainty. Other chapters consider the nature of problem solving
in the context of general intellectual principles and specific
domain knowledge, the cognition of scientific discovery, and
language representation modes and information processing
efficiency. In the last chapter the most impressive intellectual
achievements of AI systems are summarized. Directions for further
intellectual research in this realm are also indicated.
Understand microgrids and networked microgrid systems Microgrids
are interconnected groups of energy sources that operate together,
capable of connecting with a larger grid or operating independently
as needed and network conditions require. They can be valuable
sources of energy for geographically circumscribed areas with
highly targeted energy needs, and for remote or rural areas where
continuous connection with a larger grid is difficult. Microgrids'
controllability makes them especially effective at incorporating
renewable energy sources. Microgrids: Theory and Practice
introduces readers to the analysis, design, and operation of
microgrids and larger networked systems that integrate them. It
brings to bear both cutting-edge research into microgrid technology
and years of industry experience in designing and operating
microgrids. Its discussions of core subjects such as microgrid
modeling, control, and optimization make it an essential short
treatment, valuable for both academic and industrial study. Readers
will acquire the skills needed to address existing problems and
meet new ones as this crucial area of power engineering develops.
Microgrids: Theory and Practice also features: Incorporation of new
cyber-physical system technologies for enabling microgrids as
resiliency resources Theoretical treatment of a wide range of
subjects including smart programmable microgrids, distributed and
asynchronous optimization for microgrid dispatch, and AI-assisted
microgrid protection Practical discussion of real-time microgrids
simulations, hybrid microgrid design, transition to renewable
microgrid networks, and more Microgrids: Theory and Practice is
ideal as a textbook for graduate and advanced undergraduate courses
in power engineering programs, and a valuable reference for power
industry professionals looking to address the challenges posed by
microgrids in their work.
PEEK “UNDER THE HOOD†OF BIG DATA ANALYTICS The world of big
data analytics grows ever more complex. And while many people can
work superficially with specific frameworks, far fewer understand
the fundamental principles of large-scale, distributed data
processing systems and how they operate. In Foundations of Data
Intensive Applications: Large Scale Data Analytics under the Hood,
renowned big-data experts and computer scientists Drs. Supun
Kamburugamuve and Saliya Ekanayake deliver a practical guide to
applying the principles of big data to software development for
optimal performance. The authors discuss foundational components of
large-scale data systems and walk readers through the major
software design decisions that define performance, application
type, and usability. You???ll learn how to recognize problems in
your applications resulting in performance and distributed
operation issues, diagnose them, and effectively eliminate them by
relying on the bedrock big data principles explained within. Moving
beyond individual frameworks and APIs for data processing, this
book unlocks the theoretical ideas that operate under the hood of
every big data processing system. Ideal for data scientists, data
architects, dev-ops engineers, and developers, Foundations of Data
Intensive Applications: Large Scale Data Analytics under the Hood
shows readers how to: Identify the foundations of large-scale,
distributed data processing systems Make major software design
decisions that optimize performance Diagnose performance problems
and distributed operation issues Understand state-of-the-art
research in big data Explain and use the major big data frameworks
and understand what underpins them Use big data analytics in the
real world to solve practical problems
The Information Age has dawned at the same time the global
political system is in transition. High technology performance and
economic productivity are converging across the major developed
regions of North America, East Asia, and Europe. If U.S. economic,
military, and political leadership is to continue, it must depend
more on flexible adaptation to the new technical and organizational
realities and less on technological dominance. The heart of this
adaptation lies in the evolution of a national technology policy
that emphasizes market forces and the exploitation of network
linkages within and among commercial and military organizations.
Fully updated to ASP.NET 5.0, ASP.NET Core in Action, Second
Edition is a hands-on primer to building cross-platform web
applications with your C# and .NET skills. Even if you've never
worked with ASP.NET you'll start creating productive cross-platform
web apps fast. And don't worry about late-breaking changes to
ASP.NET Core. With this Manning Early Access Program edition you'll
get updates right up until it ships to the printer, so you're
always working with the latest version of the technology. about the
technologyASP.NET Core is a highly flexible, high performance cross
platform web framework that's entirely free and open source.
ASP.NET Core developers enjoy choice without compromise, benefiting
from both a mature, well-supported stack and the freedom to develop
and deploy from and onto any cloud or on-prem platform. Now in
version 5.0, the latest version of ASP.NET Core includes powerful
new additions for building server-side apps and background
services. about the book ASP.NET Core in Action, Second Edition
opens up the world of cross-platform web development with ASP.NET
Core. You'll start with a crash course in .NET Core, immediately
cutting the cord between ASP.NET and Windows. Then, you'll begin to
build amazing web applications step by step, systematically adding
essential features like logins, configuration, dependency
injection, and custom components. Along the way, you'll mix in
important process steps like testing, multiplatform deployment, and
security. Fully updated to version 5.0, this new edition fully
covers new features such as server-side apps with Razor Pages, and
the new ASP.NET Core hosting paradigm. what's inside Covers ASP.NET
Core 5.0 Dynamic page generation with the Razor templating engine
Server-side apps with Razor Pages Authentication and authorization
Unit tests and integration tests for ASP.NET Core apps Create a Web
API for serving JSON to client-side applications Developing ASP.NET
Core apps for non-Windows servers about the readerReaders need
intermediate experience with C# or a similar language. about the
author Andrew Lock is a Microsoft MVP who has been working with
ASP.NET Core since before the first release. He has a PhD in
digital image processing, and has been developing professionally
using .NET for the last 10 years.
This book provides readers with a 360-degree perspective on the
Internet of Things (IoT) design and M2M communication process. It
is intended to be used as a design guide for the development of IoT
solutions, covering architecture, design, and development methods.
This book examines applications such as industry automation for
Industry 4.0, Internet of Medical Things (IoMT), and Internet of
Services (IoS) as it is unfolding. Discussions on engineering
fundamentals are limited to what is required for the realization of
IoT solutions. Internet of Things and M2M Communication
Technologies: Architecture and Practical Design Approach to IoT in
Industry 4.0 is written by an industry veteran with more than 30
years of hands-on experience. It is an invaluable guide for
electrical, electronic, computer science, and information science
engineers who aspire to be IoT designers and an authoritative
reference for practicing designers working on IoT device
development. Provides complete design approach to develop IoT
solutions; Includes reference designs and guidance on relevant
standards compliance; Addresses design for manufacturability and
business models.
|
You may like...
human nature
Justine Nicole Flores
Paperback
R232
Discovery Miles 2 320
Captain America
Jack Kirby, Joe Simon, …
Paperback
R672
R600
Discovery Miles 6 000
|