![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
An in-depth assessment of innovations in military information technology informs hypothetical outcomes for artificial intelligence adaptations In the coming decades, artificial intelligence (AI) could revolutionize the way humans wage war. The military organizations that best innovate and adapt to this AI revolution will likely gain significant advantages over their rivals. To this end, great powers such as the United States, China, and Russia are already investing in novel sensing, reasoning, and learning technologies that will alter how militaries plan and fight. The resulting transformation could fundamentally change the character of war. In Information in War, Benjamin Jensen, Christopher Whyte, and Scott Cuomo provide a deeper understanding of the AI revolution by exploring the relationship between information, organizational dynamics, and military power. The authors analyze how militaries adjust to new information communication technology historically to identify opportunities, risks, and obstacles that will almost certainly confront modern defense organizations as they pursue AI pathways to the future. Information in War builds on these historical cases to frame four alternative future scenarios exploring what the AI revolution could look like in the US military by 2040.
Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one easy-to-follow resource CompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible. Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms. Covering all five domains tested by Exam SY0-601, this guide reviews: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance This newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.
This book is an essential purchase if you want to benefit from the knowledge and experience of those involved in the writing of the ISTQB Syllabus. This book adopts a practical and hands-on approach, covering the fundamental principles that every system and software tester should know. The authors are seasoned test-professionals and developers of the ISTQB syllabus itself, so syllabus coverage is thorough and in-depth. This book is designed to help you pass the ISTQB exam and qualify at Foundation Level, and is enhanced with many useful learning aids. ABOUT ISTQB ISTQB is a multi-national body overseeing the development of international qualifications in software testing. In a world of employment mobility and multi-national organizations, having an internationally recognized qualification ensures that there is a common understanding, internationally, of software testing issues.
Looking towards the future can be daunting, but with Future Hackers, the sequel to The Future Is Now, you can prepare for the exciting changes that lie ahead. From technological advancements to cultural shifts, the coming years will bring unprecedented transformations that will shape our lives in ways we can't even imagine. This book is your essential guide to understanding these changes and adapting to them with optimism and confidence. With expert insights into the latest trends in work, leadership and technology, Future Hackers is your indispensable tool for thriving in a rapidly changing world. Whether you're a business leader, a student, or just someone who wants to stay ahead of the curve, this book will help you navigate the road to 2030 and beyond.
The need for continual development and transformation of healthcare information systems is evident, though progress in this arena is often met with a significant number of challenges. Developments in Healthcare Information Systems and Technologies: Models and Methods presents the latest research in healthcare information systems design, development, and deployment, benefiting researchers, practitioners, and students. Contributions investigate topics such as clinical education, electronic medical records, clinical decision support systems, and IT adoption in healthcare.
Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance? Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA's programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules-most of which date from the 1970s-are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough. Edgar argues that our communications today-and the national security threats we face-are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone's privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform.
AN FT BUSINESS BOOK OF THE MONTH The book that will make you rethink everything you thought you knew about data, privacy and the future of Big Tech. 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' Almost everything we do generates data. Digital technology is now so pervasive that it's very hard to escape its influence, and with that growth comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us – whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus – and explains why the best is yet to come. Data touches everything, from our biggest hates (online advertising) to our greatest loves (our pets), and in this fascinating new book, Gilbert explores how, if we can embrace the revolution (even the ads), we could all live vastly improved lives. We are standing on the edge of greatness, we just need to know how to get there.
Design patterns and architectures for building production quality applications using functional programming, with examples in Haskell and other FP languages. In Functional Design and Architecture you will learn: Designing production applications in statically typed functional languages such as Haskell Controlling code complexity with functional interfaces Architectures, subsystems, and services for functional languages Developing concurrent frameworks and multithreaded applications Domain-driven design using free monads and other functional tools Property-based, integrational, functional, unit, and automatic whitebox testing Functional Design and Architecture is a pioneering guide to software engineering using Haskell and other functional languages. In it, you’ll discover Functional Declarative Design and other design principles perfect for working in Haskell, PureScript, F#, and Scala. about the technology Functional programming offers a powerful alternative to object-oriented programming that helps tackle the complexities of large-scale software. Entrenched design patterns and architectural principles made for OOP are poorly suited for creating large-scale functional applications. This book lays out new methodologies, principles, and architectures optimized for high-level software design using functional languages. about the book Functional Design and Architecture is a comprehensive guide to software engineering using functional programming. Inside, you’ll find cutting-edge functional design principles and practices for every stage of application development, from architecting your application through to running simple and maintainable tests. There’s no abstract theory—you’ll learn by building exciting sample applications, including an application for controlling a spaceship and a full-fledged backend framework. RETAIL SELLING POINTS Designing production applications in statically typed functional languages such as Haskell Controlling code complexity with functional interfaces• Architectures, subsystems, and services for functional languages Developing concurrent frameworks and multithreaded applications Domain-driven design using free monads and other functional tools Property-based, integrational, functional, unit, and automatic whitebox testing AUDIENCE For experienced developers who know a functional language.
Estimating software development often produces more angst than value, but it doesn't have to. Identify the needs behind estimate requests and determine how to meet those needs simply and easily. Choose estimation techniques based on current needs and available information, gaining benefit while reducing cost and effort. Detect bad assumptions that might sink your project if you don't adjust your plans. Discover what to do when an estimate is wrong, how to recover, and how to use that knowledge for future planning. Learn to communicate about estimates in a healthy and productive way, maximizing advantage to the organization and minimizing damage to the people. In a world where most developers hate estimation and most managers fear disappointment with the results, there is hope for both. It requires giving up some widely held misconceptions. Let go of the notion that "an estimate is an estimate" and estimate for the particular need you, and your organization, have. Realize that estimates have a limited shelf-life, and reestimate frequently if it's important. When reality differs from your estimate, don't lament; mine that disappointment for the gold that can be the longer-term jackpot. Estimate in comparison to past experience, by modeling the work mathematically, or a hybrid of both. Learn strategies for effective decomposition of work and aspects of the work that likely affect your estimates. Hedge your bets by comparing the results of different approaches. Find out what to do when an estimate proves wrong. And they will. They're estimates, after all. You'll discover that you can use estimates to warn you of danger so you can take appropriate action in time. Learn some crucial techniques to understand and communicate with those who need to understand. Address both the technical and sociological aspects of estimation, and you'll help your organization achieve its desired goals with less drama and more benefit. What You Need: No software needed, just your past experience and concern for the outcomes.
This book offers a survey of successful attributes of the systems engineer. It focuses on the key positive attributes of what today’s systems engineer should be and puts a model in place for achievement and behavior for future systems engineers. The book, in survey form, provides a description of how and why systems engineers can be, and have been, successful. It offers successful attributes, focuses on the key positive qualities, and drills down to the success features to aim for and the failure characteristics to avoid. The ending result is that it sets a model for achievement and behavior for future systems engineers to follow a successful path. This book will be helpful to systems engineers, industrial engineers, mechanical engineers, general engineers, and those in technical management.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age—an age when such liberties have an outsized influence on the citizen–State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies—its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen–State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
Understand Kubernetes and other orchestration systems deeply by building your own using Go and the Docker API. In Build an Orchestrator in Go you will learn how to: Identify the components that make up any orchestration system Schedule containers on to worker nodes Start and stop containers using the Docker API Manage a cluster of worker nodes using a simple API Work with algorithms taken from cutting-edge Google Borg research papers Demystify orchestration systems like Kubernetes and Nomad Orchestration systems like Kubernetes coordinate other software subsystems and services to create a complete organized system. Although orchestration tools have a reputation for complexity, they’re designed around few important patterns that apply across many aspects of software development. Build an Orchestrator in Go reveals the inner workings of orchestration frameworks by guiding you as you design and implement your own using the Go SDK. As you create your own orchestration framework, you’ll improve your understanding of Kubernetes and its role in distributed system design. You’ll also build the skills required to design custom orchestration solutions for those times when an out-of-the-box solution isn’t a good fit. about the technology Orchestration systems provide the management framework for software and infrastructure that’s distributed across multiple machines and services. By managing the many individual components and containers in a large application, they ensure web apps are resilient and reliable, automatically switching between resources in response to crashes and outages. A properly designed orchestration system can seamlessly scale to handle traffic loads, and reduce time-consuming manual work for sysadmin and site reliability engineers. about the book Build an Orchestrator in Go teaches you to implement an orchestrator from scratch. You’ll discover the components that make up all orchestration systems, and use the Docker API and Go SDK to build layers of functionality from tasks, to workers, to the manager. Learn how to save on costs by maximising the usage of a cluster, or spread tasks among workers to avoid overload and downtime. Once you’ve built your working system, you’ll even implement a command line user interface to easily manage your orchestrator.
This book is an attempt to establish in the readers the importance of creating interoperable data stores and writing rules for handling this data. It also covers extracts from a few project dissertations and a research funded project that the author had supervised.• Describes the power of ontologies for better data management• Provides an overview of knowledge engineering including ontology engineering, tools and techniques• Provides sample development procedures for creating two domain ontologies.• Depicts the utility of ontological representation in situation awareness• Demonstrates recommendation engine for unconventional emergencies using a hybrid reasoning approach.• The text explains how to make better utilization of resources when emergency strikesGraduates and undergraduates doing courses in artificial intelligence, semantic web and knowledge engineering will find this book beneficial.
Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now spreading to highly sophisticated tasks across multiple domains, such as medical diagnostics or fully autonomous vehicles. While this development holds great potential, it also raises new safety concerns, as machine learning has many specificities that make its behaviour prediction and assessment very different from that for explicitly programmed software systems. This book addresses the main safety concerns with regard to machine learning, including its susceptibility to environmental noise and adversarial attacks. Such vulnerabilities have become a major roadblock to the deployment of machine learning in safety-critical applications. The book presents up-to-date techniques for adversarial attacks, which are used to assess the vulnerabilities of machine learning models; formal verification, which is used to determine if a trained machine learning model is free of vulnerabilities; and adversarial training, which is used to enhance the training process and reduce vulnerabilities. The book aims to improve readers’ awareness of the potential safety issues regarding machine learning models. In addition, it includes up-to-date techniques for dealing with these issues, equipping readers with not only technical knowledge but also hands-on practical skills.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Since the release of V0.01 in 2006, to the present V4.0 version, RT-Thread has developed a reputation among developers for its open source strategy. RT-Thread has gained a large following among members of the embedded open source community in China with hundreds of thousands of enthusiasts. RT-Thread is widely used in energy, automotive, medical, consumer electronics, among other applications, making it a mature and stable open source embedded operating system. The purpose of RT-Thread RTOS Design and Implementation is to create an easy learning curve for mastering RT-Thread, so that more developers can participate in the development of RT-Thread and work together to create an open source, tiny, and beautiful Internet of Things operating system. The book’s first part introduces the RT-Thread kernel and starts with an overview of RT-Thread before covering thread management, clock management, inter-thread synchronization, inter-thread communication, memory management, and interrupt management. The second part begins with RT-Thread kernel porting and explains how to port RT-Thread to a hardware board to run it. The second part also introduces RT-Thread components and discusses the Env development environment, FinSH console, device management, and network framework. Additional topics covered include: The I/O device framework Virtual file systems Peripheral interfaces Devices including the PIN device, UART device, and ADC device, among others. Each chapter features code samples, as well as helpful tables and graphs, so you can practice as you learn as well as perform your own experiments.
Der mit der Digitalisierung der Kommunikation einhergehende Wandel von Kommunikations- und Medienkulturen beeinflusst die Produktionsbedingungen und den Rezeptionsrahmen von Texten sowie kommunikative Praktiken und kommunikatives Handeln. Um kommunikative Praktiken zu vollziehen und kommunikatives Handeln möglichst effektiv zu gestalten, entstehen vielfältige diskursive Kommunikationsräume, in denen mediale Akteure zu verschiedenen Zwecken miteinander agieren. Mit der Verlagerung der kommunikativen Praktiken in die digitale Welt kommt es zur Verlinkung von Texten zu Diskursen, die multisemiotisch und multimedial geprägt und auf Interaktion ausgerichtet sind. Dieses Buch ist solchen diversen textuellen und diskursiven Erscheinungsformen der massenmedialen Kommunikation gewidmet, die auf der Grundlage erschlossener Textkorpora interdisziplinär untersucht werden. Gegenstand der breit gefächerten Diskussion sind hier einzelne Texte und zusammenhängende Textformate in verschiedenen Medien sowie diskursiv organisierte Textwelten diverser multimodaler und -medialer Ausgestaltung.
Following significant advances in deep learning and related areas interest in artificial intelligence (AI) has rapidly grown. In particular, the application of AI in drug discovery provides an opportunity to tackle challenges that previously have been difficult to solve, such as predicting properties, designing molecules and optimising synthetic routes. Artificial Intelligence in Drug Discovery aims to introduce the reader to AI and machine learning tools and techniques, and to outline specific challenges including designing new molecular structures, synthesis planning and simulation. Providing a wealth of information from leading experts in the field this book is ideal for students, postgraduates and established researchers in both industry and academia.
ARE YOU READY FOR AN AMAZING NEW EDITION OF THE PHOTOSHOP BOOK THAT BREAKS ALL THE RULES? Scott Kelby, Editor and Publisher of Photoshop User magazine—and the #1 best-selling photography techniques author—once again takes this book to a whole new level as he uncovers more of the latest, most important, and most useful Adobe Photoshop techniques for photographers. This update to his award-winning, record-breaking book does something for digital photographers that has never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure it out on your own. Instead, Scott shows you step by step the exact techniques used by today’s cutting-edge photographers, and best of all, he shows you flat-out exactly which settings to use, when to use them, and why. That’s why editions of this book are widely used as the official study guide in photography courses at colleges and universities around the world. The photographer’s workflow in Photoshop has evolved greatly over time and, in the latest edition of this book, you’ll learn how to leverage Photoshop’s new AI-powered masking features and how to spend less time on boring production tasks, so you can spend more time being creative. Plus, you’ll learn: The most useful retouching techniques for photographers, such as how to make “impossible” selections, like wind-blown hair (it’s easy, once you know the secrets), and how to use layers like a pro. The sharpening techniques the pros really use. The pros’ tricks for fixing the most common photo problems fast! How to seamlessly remove distracting things from your images. How to make the most of Camera Raw and when to work it into your workflow, even if you never shoot in RAW—it works great on JPEGs and TIFFs, too. The latest Photoshop special effects for photographers (there’s a whole chapter just on these!). A host of shortcuts, workarounds, and slick “insider” tricks to help you get twice the work done in half the time. You also get four online bonus chapters with even more content, along with the images used in the book, for download, so you can follow right along. If you’re ready to learn all the “tricks of the trade”—the same ones that today’s leading pros use to correct, edit, retouch, and sharpen their work—then you’re holding the book that will do just that.
Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply with them. Where US organizations and businesses who collect or receive EU personal data fail to comply with the rule, the bottom line can suffer from very significant official fines and penalties, as well as from users, customers or representative bodies to pursuing litigation. This guide is essential for all US enterprises who directly or indirectly deal with EU personal data.
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availability and satisfactory service quality. This requirement gives rise to the popularity of the research on the self-adaptive software in open environment. There are some academic conferences dedicated to this field. But there is a lack of monographs about the topic. We believe such need is unmet in marketplace. By publishing the book, it can help bridge the gap and bring benefits to readers thereof. Key Features: The topic is well-motivated, interesting and actively studied worldwide The research represents as the state-of-the-art in the field The technical part of the book is rigidly evaluated The theoretical part of the book is sound and proved The organization and presentation of the book will be double-checked by professional scholars
|
You may like...
Business, Technological, and Social…
Maria Manuela Cruz Cunha, Vitor Hugo Costa Carvalho, …
Hardcover
R4,684
Discovery Miles 46 840
|