![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
Learn to effectively deliver business aligned cybersecurity outcomes In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes. The authors use illustrative stories to show professionals how to establish an executive presence and avoid the most common pitfalls experienced by technology experts when speaking and presenting to executives. The book will show you how to: Inspire trust in senior business leaders by properly aligning and setting expectations around risk appetite and capital allocation Properly characterize the indispensable role of cybersecurity in your company's overall strategic plan Acquire the necessary funding and resources for your company's cybersecurity program and avoid the stress and anxiety that comes with underfunding Perfect for security and risk professionals, IT auditors, and risk managers looking for effective strategies to communicate cybersecurity concepts and ideas to business professionals without a background in technology. The CISO Evolution is also a must-read resource for business executives, managers, and leaders hoping to improve the quality of dialogue with their cybersecurity leaders.
A revealing genealogy of image-recognition techniques and technologies Today’s most advanced neural networks and sophisticated image-analysis methods come from 1950s and ’60s Cold War culture—and many biases and ways of understanding the world from that era persist along with them. Aerial surveillance and reconnaissance shaped all of the technologies that we now refer to as computer vision, including facial recognition. The Birth of Computer Vision uncovers these histories and finds connections between the algorithms, people, and politics at the core of automating perception today. James E. Dobson reveals how new forms of computerized surveillance systems, high-tech policing, and automated decision-making systems have become entangled, functioning together as a new technological apparatus of social control. Tracing the development of a series of important computer-vision algorithms, he uncovers the ideas, worrisome military origins, and lingering goals reproduced within the code and the products based on it, examining how they became linked to one another and repurposed for domestic and commercial uses. Dobson includes analysis of the Shakey Project, which produced the first semi-autonomous robot, and the impact of student protest in the early 1970s at Stanford University, as well as recovering the computer vision–related aspects of Frank Rosenblatt’s Perceptron as the crucial link between machine learning and computer vision. Motivated by the ongoing use of these major algorithms and methods, The Birth of Computer Vision chronicles the foundations of computer vision and artificial intelligence, its major transformations, and the questionable legacy of its origins. Cover alt text: Two overlapping circles in cream and violet, with black background. Top is a printed circuit with camera eye; below a person at a 1977 computer.
Whether you want to automate tasks, analyze data, parse logs, talk to network services, or address other systems requirements, writing your own command-line tool may be the fastest - and perhaps the most fun - way to do it. The Go programming language is a great choice for developing tools that are fast, reliable, and cross-platform. Create command-line tools that work with files, connect to services, and even manage external processes, all while using tests and benchmarks to ensure your programs are fast and correct. When you want to develop cross platform command-line tools that are fast and reliable, use Go, a modern programming language that combines the reliability of compiled languages with the ease of use and flexibility of dynamic typed languages. Work through practical examples to develop elegant and efficient tools by applying Go's rich standard library, its built in support for concurrency, and its expressive syntax. Use Go's integrated testing capabilities to automatically test your tools, ensuring they work reliably even across code refactoring. Develop CLI tools that interact with your users by using common input/output patterns, including environment variables and flags. Handle files to read or persist data, and manipulate paths consistently in cross-platform scenarios. Control processes and handle signals, and use a benchmark driven approach and Go's concurrency primitives to create tools that perform well. Use powerful external libraries such as Cobra to create modern and flexible tools that handle subcommands, and develop tools that interact with databases, APIs, and network services. Finally, leverage what you learned by tackling additional challenges at the end of each chapter. What You Need: Go 1.8 or higher, an internet connection to download the example files and additional libraries, and a text editor to write your programs.
Academic and practitioner journals in fields from electronics to
business to language studies, as well as the popular press, have
for over a decade been proclaiming the arrival of the "computer
revolution" and making far-reaching claims about the impact of
computers on modern western culture. Implicit in many arguments
about the revolutionary power of computers is the assumption that
communication, language, and words are intimately tied to culture
-- that the computer's transformation of communication means a
transformation, a revolutionizing, of culture.
Just about any social need is now met with an opportunity to "connect" through digital means. But this convenience is not free—it is purchased with vast amounts of personal data transferred through shadowy backchannels to corporations using it to generate profit. The Costs of Connection uncovers this process, this "data colonialism," and its designs for controlling our lives—our ways of knowing; our means of production; our political participation. Colonialism might seem like a thing of the past, but this book shows that the historic appropriation of land, bodies, and natural resources is mirrored today in this new era of pervasive datafication. Apps, platforms, and smart objects capture and translate our lives into data, and then extract information that is fed into capitalist enterprises and sold back to us. The authors argue that this development foreshadows the creation of a new social order emerging globally—and it must be challenged. Confronting the alarming degree of surveillance already tolerated, they offer a stirring call to decolonize the internet and emancipate our desire for connection.
Technopoles - planned centres for the promotion of high-technology industry - have become a key feature of national economic development worldwide. Created out of a technological revolution, the formation of the global economy and the emergence of a new form of economic production and management, they constitute the mines and foundries of the information age, redefining the conditions and processes of local and regional development. This text is a systematic survey of technopoles in all manifestations: science parks, science cities, national technopoles and techno-belt programmes. Detailed case studies, ranging from the Silicon Valley to Siberia and from the M4 Corridor to Taiwan, relate how global technopoles have developed, what each is striving to achieve and how well it is succeeding. "Technopoles of the World" distils the lessons learned from the successes and failures, embracing a host of disparate concepts and a few myths, and offering guidelines for national, regional and local planners and developers worldwide.
You've seen the movie, now PLAY the movie! Long before gaming came to the big screen, cinema arrived in the homes of millions in the form of licensed video games; playable merchandise that tied in to some of the major tentpoles of cinematic history. Many of these games followed the storylines of the movies on which they were based, as well as providing supplementary adventures to major franchises. Collected in this book are some of the biggest games to come from Hollywood adventures during the '80s and '90s. In this comprehensive book, you'll find over 300 games across 18 chapters, with sections dedicated to major movie franchises such as Star Wars, Jurassic Park, Top Gun, Pixar, Aliens and Indiana Jones, along with nearly 200 full-colour screenshots of major releases. Showcasing the highs and lows of early computer gaming through the 16-bit era and onto the advent of 3D console gaming, A Guide to Movie Based Video Games: 1982 - 2000 covers two decades of video games with trivia, analysis and recommendations. Grab your controller, step into the silver screen and get ready to play!
Complete coverage of all objectives in the 2023 release of the CAPM exam Take the Certified Associate in Project Management (CAPM) exam with confidence using this highly effective self-study guide. Written by a project management expert and bestselling author, CAPM Certified Associate in Project Management All-in-One Exam Guide offers complete coverage of every objective on the current version of the test. To help you study, each chapter contains unique design elements that emphasize important points and aid in retention. An appendix, “50 Confusing Terms on the CAPM Exam,” will help you understand the differences in terms that sound similar but have different meanings. In addition, the book includes more than 450 practice questions along with detailed answer explanations. Designed to help you pass the exam with ease, this comprehensive guide also serves as an essential on-the-job reference for project management professionals. Covers all exam topics, including: Project Management Fundamentals and Core Concepts Predictive, Plan-Based Methodologies Agile Frameworks/Methodologies Business Analysis Frameworks Online content includes: Practice exams—test yourself by CAPM exam domain or take a complete exam Printable flash cards, word puzzles, and matching exercises for self-directed learning Printable CAPM memory card for on-the-go study
A single dramatic software failure can cost a company millions of dollars - but can be avoided with simple changes to design and architecture. This new edition of the best-selling industry standard shows you how to create systems that run longer, with fewer failures, and recover better when bad things happen. New coverage includes DevOps, microservices, and cloud-native architecture. Stability antipatterns have grown to include systemic problems in large-scale systems. This is a must-have pragmatic guide to engineering for production systems. If you're a software developer, and you don't want to get alerts every night for the rest of your life, help is here. With a combination of case studies about huge losses - lost revenue, lost reputation, lost time, lost opportunity - and practical, down-to-earth advice that was all gained through painful experience, this book helps you avoid the pitfalls that cost companies millions of dollars in downtime and reputation. Eighty percent of project life-cycle cost is in production, yet few books address this topic. This updated edition deals with the production of today's systems - larger, more complex, and heavily virtualized - and is the first book to cover chaos engineering, the discipline of applying randomness and deliberate stress to reveal systematic problems. Build systems that survive the real world, avoid downtime, implement zero-downtime upgrades and continuous delivery, and make cloud-native applications resilient. Examine ways to architect, design, and build software - particularly distributed systems - that stands up to the typhoon winds of a flash mob, a Slashdotting, or a link on Reddit. Take a hard look at software that failed the test and find ways to make sure your software survives.
Given the recent advances in telecommunications and the fact that the French lead the field in many aspects of information technology, this will be a valuable tool for students, translators and interpreters. The author has himself worked for a number of years as a technical translator and the dictionary reflects his knowledge and practical experience. 30,000 entries in each language cover terminology used in telecommunications, electronics and computer science, and developments in related disciplines such as the design and manufacture of printed circuits and components, installation, testing, maintenance and software programming.
Languages may come and go, but the relational database endures. Learn how to use Ecto, the premier database library for Elixir, to connect your Elixir and Phoenix apps to databases of the SQL and NoSQL variety. Get a firm handle on Ecto fundamentals with a module-by-module tour of the critical parts of Ecto. Then move on to more advanced topics and advice on best practices with a series of recipes that provide clear, step-by-step instructions on scenarios commonly encountered by app developers. Co-authored by the creator of Ecto, this title provides all the essentials you need to use Ecto effectively. Elixir and Phoenix are taking the application development world by storm, and Ecto, the database library that ships with Phoenix, is going right along with them. There are plenty of examples that show you the basics, but to use Ecto to its full potential, you need to learn the library from the ground up. This definitive guide starts with a tour of the core features of Ecto - repos, queries, schemas, changesets, transactions - gradually building your knowledge with tasks of ever-increasing complexity. Along the way, you'll be learning by doing - a sample application handles all the boilerplate so you can focus on getting Ecto into your fingers. Build on that core knowledge with a series of recipes featuring more advanced topics. Change your pooling strategy to maximize your database's efficiency. Use nested associations to handle complex table relationships. Add streams to handle large result sets with ease. Based on questions from Ecto users, these recipes cover the most common situations developers run into. Whether you're new to Ecto, or already have an app in production, this title will give you a deeper understanding of how Ecto works, and help make your database code cleaner and more efficient. What You Need: To follow along with the book, you should have Erlang/OTP 19+ and Elixir 1.4+ installed. The book will guide you through setting up a sample application that integrates Ecto.
This book explores the various historical and cultural aspects of scientific, medical and technical exchanges that occurred between central Europe and Asia. A number of papers investigate the printing, gunpowder, guncasting, shipbuilding, metallurgical and drilling technologies while others deal with mapping techniques, the adoption of written calculation and mechanical clocks as well as the use of medical techniques such as pulse taking and electrotherapy. While human mobility played a significant role in the exchange of knowledge, translating European books into local languages helped the introduction of new knowledge in mathematical, physical and natural sciences from central Europe to its periphery and to the Middle East and Asian cultures. The book argues that the process of transmission of knowledge whether theoretical or practical was not a simple and one-way process from the donor to the receiver as it is often admitted, but a multi-dimensional and complex cultural process of selection and transformation where ancient scientific and local traditions and elements. The book explores the issue from a different geopolitical perspective, namely not focusing on a singular recipient and several points of distribution, namely the metropolitan centres of science, medicine, and technology, but on regions that are both recipients and distributors and provides new perspectives based on newly investigated material for historical studies on the cross scientific exchanges between different parts of the world.
With Big Tech's breakthrough into finance with blockchain, it is imperative that finance players understand the ramifications and how they can defend their competitive advantage. Big Tech in Finance provides a cutting edge look at Big Tech's play for domination of the crypto economy, its ramifications and how finance is fighting back. The book analyses the motives behind Big Tech's break into banking and unpicks the strategies behind the use of blockchain, technology interfaces, infrastructure and investments into blockchain unicorns. The book then goes onto review how organizations in finance are countering these threats, with governments and banks driving their own strategies and use of centralized blockchains. Delving into the fight between Big Tech, Big Banking, start-ups, and regulators, Big Tech in Finance analyzes which actors have the best shot at succeeding. It explores the key tools in play, such as smart contracts, digital central bank currencies, decentralized autonomous organizations (DAOs) and the metaverse. The book also divulges the geopolitical dimensions underpinning the power struggle and its implications for the industry. Written by an internationally recognized expert on blockchain, the book draws on in-depth interviews with founders, investors, regulators, bankers and blockchain experts to provide valuable insider insights. This will be an essential read for finance and fintech professionals, bankers and investors and anyone else interested in the developments of fintech.
This book highlights the applications of blockchain technologies to foster sustainable development in different fields. The concept of Sustainability has grown widespread in today's context and there are many requirements to achieve Sustainability in any industrial sector including mapping, tracing the supply chain to ensure sustainable supply chain management. Reliable and transparent, efficient data is one of the key requirements for Sustainability in today's advanced industrial context. Achievement of Sustainability objectives in this advanced era demands various technological advancements such as Blockchain technologies. The core competencies of blockchain technology namely transparency, data auditability, privacy, value transfer, and process efficiency and automation are very much essential for achieving the multifold objectives under sustainability.
Value-Driven Data explains how data and business leaders can co-create and deploy data-driven solutions for their organizations. Value-Driven Data explores how organizations can understand their problems and come up with better solutions, aligning data storytelling with business needs. The book reviews the main challenges that plague most data-to-business interactions and offers actionable strategies for effective data value implementation, including methods for tackling obstacles and incentivizing change. Value-Driven Data is supported by tried-and-tested frameworks that can be applied to different contexts and organizations. It features cutting-edge examples relating to digital transformation, data strategy, resolving conflicts of interests, building a data P&L and AI value prediction methodology. Recognizing different types of data value, this book presents tangible methodologies for identifying, capturing, communicating, measuring and deploying data-enabled opportunities. This is essential reading for data specialists, business stakeholders and leaders involved in capturing and executing data value opportunities for organizations and for informing data value strategies.
In the last decade, data science has generated new fields of study and transformed existing disciplines. As data science reshapes academia, how can libraries and librarians engage with this rapidly evolving, dynamic form of research? Can libraries leverage their existing strengths in information management, instruction, and research support to advance data science? Data Science in the Library: Tools and Strategies for Supporting Data-Driven Research and Instruction brings together an international group of librarians and faculty to consider the opportunities afforded by data science for research libraries. Using practical examples, each chapter focuses on data science instruction, reproducible research, establishing data science services and key data science partnerships. This book will be invaluable to library and information professionals interested in building or expanding data science services. It is a practical, useful tool for researchers, students, and instructors interested in implementing models for data science service that build community and advance the discipline.
Informed by theories of international relations, this book assesses global political conflicts over cyberspace. It also analyzes the unique governance challenges that the Internet presents, both in terms of technical problems and control over content. The Internet is a resource of unparalleled importance to all countries and societies, but the current decentralized system of Internet governance is being challenged by some governments that seek to assert sovereign control over the technology. The political battles over governing the Internet—ones that are coming and conflicts that have already started—have far-reaching implications. This book analyzes the shifting nature of Internet governance as it affects timely and significant issues including Internet freedom, privacy, and security, as well as individual and corporate rights. Controlling Cyberspace: The Politics of Internet Governance and Regulation covers a broad range of issues related to Internet governance, presenting a technical description of how the Internet works, an overview of the Internet governance ecosystem from its earliest days to the present, an examination of the roles of the United Nations and other international and regional organizations in Internet governance, and a discussion of Internet governance in relation to specific national and international policies and debates. Readers will consider if access to the Internet is a human right and if the right to freedom of expression applies equally to the exchange of information online. The book also addresses how the digital divide between those in developed countries and the approximately 5 billion people who do not have access to the Internet access affects the issue of Internet governance, and it identifies the challenges involved in protecting online privacy in light of government and corporate control of information.
This collection of new essays explores issues of identity, work and play in the virtual world of Second Life (SL). Fourteen women explore their experiences in this virtual environment. Topics include teaching in Second Life, becoming an SL journalist, and using SL as a means to bring human rights to health care; exploring issues of identity and gender such as performing the role of digital geisha, playing with gender crossing, or determining how identity is formed virtually; examining how race is perceived; and investigating creativity such as poetry writing or quilting. The text is unique in that it represents only women and their experiences in a world that is most often viewed as a man's world.
Ready to master Python? Learn to write effective code, whether you’re a beginner or a professional programmer. Review core Python concepts, including functions, modularization, and object orientation and walk through the available data types. Then dive into more advanced topics, such as using Django and working with GUIs. With plenty of code examples throughout, this hands-on reference guide has everything you need to become proficient in Python! Highlights include: 1) Functions 2) Methods 3) Attributes 4) Data types 5) GUIs 6) Debugging 7) Network communication 8) Modularization 9) Object orientation 10) Iterators 11) Generators 12) Exception handling
Concurrency can be notoriously difficult to get right, but fortunately, the Go open source programming language makes working with concurrency tractable and even easy. If you’re a developer familiar with Go, this practical book demonstrates best practices and patterns to help you incorporate concurrency into your systems. Author Katherine Cox-Buday takes you step-by-step through the process. You’ll understand how Go chooses to model concurrency, what issues arise from this model, and how you can compose primitives within this model to solve problems. Learn the skills and tooling you need to confidently write and implement concurrent systems of any size. Understand how Go addresses fundamental problems that make concurrency difficult to do correctly Learn the key differences between concurrency and parallelism Dig into the syntax of Go’s memory synchronization primitives Form patterns with these primitives to write maintainable concurrent code Compose patterns into a series of practices that enable you to write large, distributed systems that scale Learn the sophistication behind goroutines and how Go’s runtime stitches everything together
The proliferation of e-journals and their impact on library collections is tremendous. E-Journals Access and Management takes a comprehensive look at how e-journals have changed the library landscape and offers librarians strategies to better manage them. This useful resource provides a broad overview of the practical and theoretical issues associated with the management of electronic journals, and contains practical and illuminating case studies of problems faced and solutions found in individual libraries. Containing chapters by respected authorities on this dynamic topic of debate, E-Journals Access and Management presents vital information on a full range of issues dealing with electronic resource access and management, including bibliographic and web access, acquisitions, and licensing.
In-depth guide to diffusion models and their impact on design, with insight on how this novel artificial intelligence technology may disrupt the industry Diffusions in Architecture: Artificial Intelligence and Image Generators delves into the impact of Diffusion AI algorithms and generative image models on architecture design and aesthetics. The book presents an in-depth analysis of how these new technologies are revolutionizing the field of architecture. The architects presented in the book focus on the application of specific AI techniques and tools used in generative design, such as Diffusion models, Dall-E2, Stable Diffusion, and MidJourney. It discusses how these techniques can generate synthetic images that are both realistic and imaginative, creating new possibilities for architectural design and aesthetics. This comprehensive overview of the impact of Diffusion AI algorithms and generative image models on the field of architecture shows how they are changing the way architects approach their work. With a foreword by Lev Manovich—artist, writer and one of the world's most influential digital culture theorists. Sharing the work and insights of a team of designers and theorists from a range of backgrounds, offering disciplinary depth, and covering the full impact of these tools and models on architecture, Diffusions in Architecture includes information on: Fresh perspectives on design and aesthetics, with designs, images, and commentary from 22 leading architects, theorists, and designers The potential of prompt engineering and text-to-image models applicable to a broad interdisciplinary audience Whether image generators, or AI in general, will be an aid for human design, or potentially displace humans from the market Fundamentals of a larger debate in the architectural discourse (and practice) on the use of image generators Collecting the different ideas that have emerged in the field, Diffusions in Architecture provides architects, designers, concept artists, and theorists with an overview of this cornucopia of architectural imaginations produced in a common effort between humans and artificial intelligence. |
![]() ![]() You may like...
Maine Nursing - Interviews and History…
Valerie Hart, Susan Henderson, …
Paperback
|