![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General
It is useful to highlight how we rely on historical research on the potential of technology in order to problematize and make sense of the prominent role of technology in the UN's framework for sustainable development and the Sustainable Development Goals. The book follows an interdisciplinary approach wherein the contributors come from the disciplines of computer science, law, philosophy, political science, economy, sociology, amongst others.
Due to tremendous shifts in the business environment of contemporary organizations following the COVID-19 pandemic, there is a need to redefine the role and importance of information technology (IT) support, which is essential for ensuring an organization’s survival. Current models are no longer valid, as in the new turbulent and digitalized environment, the need for IT support is more crucial and indispensable than ever. This book proposes a new model explaining the factors inf luencing the efficiency of adaptable IT support in contemporary organizations, including those operating normally and during crises. The author demonstrates how organizations benefit from IT support, not only by enabling higher performance but also by facilitating organizational continuity, reliability, and even survival during various stages of crisis. The proposed model provides a basis for theory development in the field of organizational continuity and reliability, offering a new body of knowledge related to the factors boosting organizational performance gained from IT support and enabling organizational survival. This book will provide valuable findings for scholars performing research in the field of IT use in organizations, IT management, crisis management, and organizational reliability.
Software evolution is a time-consuming and costly process due to its complex architecture. Software designers need to produce software that is effective as well as durable. Durability and effectiveness of software are the foremost priorities and challenges for developers. This book comprises real-life case studies of durability issues and their solutions that bring to light loopholes and show how to fix them, to enhance durability. Existing literature on software durability tells us that the first step is to recognise the problem. It gives information about durability, risk, estimation, knowledge, and governance based on five main characteristics: dependability, trustworthiness, usability, security, and human trust. The book serves as a complete package to get acquainted with assurance and risk management from a software durability perspective. It enhances our understanding of the concept of durability, its multi-dimensional approach, threats and their types, risk, mitigation techniques, and suggestive measures. The book reviews the emerging trends in the software development process in the context of durability concepts such as automated code reviews, coding standards, and software durability standards and their testing, cost management solutions, low-code or no-code solutions, and durability assurance.
• Utilizes case studies from different disciplines and sectors within engineering and other related technical areas to demonstrate how to go from data, to insight, and to decision making • Introduces various approaches to build models that exploits different algorithms • Discusses predictive models that can be built through machine learning and used to mine patterns from large datasets • Explores the augmentation of technical and mathematical materials with explanatory worked examples • Includes a glossary, lecture notes, self-assessments, and worked-out practice exercises
This book highlights leading-edge research in multi-disciplinary areas in Physics, Engineering, Medicine, and Health care, from the 6th IRC Conference on Science, Engineering and Technology (IRC-SET 2020) held in July 2020 at Singapore. The papers were shortlisted after extensive rounds of reviews by a panel of esteemed individuals who are pioneers in their domains. The book also contains excerpts of the speeches by eminent personalities who graced the occasion, thereby providing written documentation of the event.
Atari’s 1981 arcade hit Tempest was a “tube shooter” built around glowing, vector-based geometric shapes. Among its many important contributions to both game and cultural history, Tempest was one of the first commercial titles to allow players to choose the game’s initial play difficulty (a system Atari dubbed “SkillStep”), a feature that has since became standard for games of all types. Tempest was also one of the most aesthetically impactful games of the twentieth century, lending its crisp, vector aesthetic to many subsequent movies, television shows, and video games. In this book, Ruggill and McAllister enumerate and analyze Tempest’s landmark qualities, exploring the game’s aesthetics, development context, and connections to and impact on video game history and culture. By describing the game in technical, historical, and ludic detail, they unpack the game’s latent and manifest audio-visual iconography and the ideological meanings this iconography evokes.
Explains the key principles of artificial intelligence and sensor technologies suitable for a food industry-based audience Introduces case studies/specific examples that can show the benefit of such technologies compared to current approaches Discusses issues around food safety, labeling and traceability and how sensing and AI can help to resolve issues Shows the current state of food manufacturing and outlines future perspectives Delivers a practical handbook and introduction to food engineers, technologists and process engineers on the benefits and challenges around modern manufacturing systems following Industry 4.0 approaches.
1. This book is useful and accessible background reading for those engaged in organized crime and cybercrime. It is written with the general reader in mind, so will be of interest to students and intelligent readers alike. 2. The book draws on a range of case studies from around the world, looking at Italian Mafias, Russian and Georgian criminal groups and drug cartels, and the Asian gangs such as the Yakuza and the Triads.
Since the late 1990s, Information and Communication Technologies (ICTs) have been hailed as a potentially revolutionary feature of the planning and management of Western cities. Economic regeneration and place promotion strategies have exploited these new technologies; city management has experimented with electronically distributed services, and participation in public life and democratic decision-making processes can be made more flexible by the use of ICTs. All of these technological initiatives have often been presented and accessed via an urban front-end information site known as 'digital city' or 'city network.' Illustrated by a range of European case studies, this volume examines the social, political and management issues and potential problems in the establishment of an electronic layer of information and services in cities. The book provides a better understanding of the direction European cities are going towards in the implementation of ICTs in the urban arena.
This book presents part of the proceedings of the Manufacturing and Materials track of the iM3F 2020 conference held in Malaysia. This collection of articles deliberates on the key challenges and trends related to manufacturing as well as materials engineering and technology in setting the stage for the world in embracing the fourth industrial revolution. It presents recent findings with regards to manufacturing and materials that are pertinent towards the realizations and ultimately the embodiment of Industry 4.0, with contributions from both industry and academia.
Sie sind ein erfolgreicher Hacker, finden jede Sicherheitslücke, überwinden jede Firewall und sind es gewohnt, immer an Ihr Ziel zu kommen? Dann haben wir jetzt schlechte Nachrichten für Sie: Dieses Buch wird Ihnen das Leben schwer machen! Dem Autor gelingt es, solide und verständlich das Hintergrundwissen über Netzwerk- und Datensicherheit zu vermitteln, das Ihnen das Handwerk legt. Kein Problem - mir fällt immer etwas Neues ein, das nicht im Buch steht, denken Sie? Dann haben wir noch eine schlechte Nachricht: Ihre neuesten Tricks verraten wir immer aktuell auf der Homepage zum Buch.
Through Silicon Via (TSV) is a key technology for realizing three-dimensional integrated circuits (3D ICs) for future high-performance and low-power systems with small form factors. This book covers both qualitative and quantitative approaches to give insights of modeling TSV in a various viewpoints such as signal integrity, power integrity and thermal integrity. Most of the analysis in this book includes simulations, numerical modelings and measurements for verification. The author and co-authors in each chapter have studied deep into TSV for many years and the accumulated technical know-hows and tips for related subjects are comprehensively covered.
First gives an introduction to computers. This provides an overview of anatomy, generation and classification of computers. In addition to this, it discusses about the personal computers, booting and viruses. Second entitled "Operating Systems" describes about disk operating system and its commands. three discusses Working in Windows. four describes word processing and creating, saving, opening and editing a document. Besides formatting options has also been described in four. Introduction to Ms-Excel and creating, editing and saving a document are explained in five and six. seven describes Mathematical Functions and their use in excel. The various features of data analysis using excel which deals with data analysis tools, tests, graphs and ANOVA along with illustrated examples are described in eight and nine. The tenth introduces the reader with Ms-Access database. number eleven gives the basic concepts of internet. number twelve discusses with pictures flow chart and algorithm.
Documentation of our cultural heritage is experiencing an explosion of innovation. New tools have appeared in recent decades including laser scanning, rapid prototyping, high dynamic range spherical and infrared imagery, drone photography, augmented and virtual reality and computer rendering in multiple dimensions. These give us visualisations and data that are at once interesting, intriguing and yet sometimes deceptive. This text provides an objective and integrated approach to the subject, bringing together the techniques of conservation with management, photographic methods, various modelling techniques and the use of unmanned aerial systems. This interdisciplinary approach addresses the need for knowledge about deploying advanced digital technologies and the materials and methods for the assessment, conservation, rehabilitation and maintenance of the sustainability of existing structures and designated historic buildings. Furthermore, this book actively provides the knowhow to facilitate the creation of heritage inventories, assessing risk, and addressing the need for sustainability.In so doing it becomes more feasible to mitigate the threats from inherent and external causes, not only for the built heritage but also for moveable objects and intangible heritage that suffer abandonment and negligence as well as looting and illegal trafficking. The book is written by a team of international experts based upon their practical experience and expertise. It therefore creates a unique book that encapsulates the knowledge of this discipline required by anyone working in this field.
A riveting account of espionage for the digital age, from one of America’s leading intelligence experts Spying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare. A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT professionals, help to understand security risks - For system administrators, help to deploy systems securely - For developers, help to secure web applications - Practical and concise, with added depth as needed - Introduction to cryptography and the Internet threat model - Coverage of TLS 1.3 as well as earlier protocol versions - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities
Explore the potentialand the pitfallsof digital technology in international business courses! Digital Technology in Teaching International Business will familiarize you with techniques that have proven effective in digitizing content or presenting traditional material in an untraditional way. You'll learn how to introduce digital technologies into bricks and mortar classrooms and how to construct an effective online learning environment. This timely and informative book discusses computer-mediated communication systems, shows how students can use the Internet to personally participate in international problem-solving exercises, presents a fascinating case study of a CLD program designed to address educational values, communication competencies, and business practices in former republics of the Soviet Union, and much more! Digital Technology in Teaching International Business outlines the challenges and demands of the knowledge-based economy and discusses the path that universities should follow in providing business students with the skills they need to succeed in this complex environment. It describes the implementation of Internet-based experiential projects in an international business classroom setting and summarizes students' perceptions and attitudes toward their assignments. In addition, it shows how to adapt experiential exercises from live courses for electronic application and examines ways in which electronic media can: increase the availabilityand reduce the costof interactive programs that connect students from distant locations complement or replace the traditional roles of textbooks and teachers promote more interactive learning enable faculty, students, scientists, technicians, entrepreneurs, and NGO leaders in separate locations to collaborate effectively help to overcome the developed-country bias present in many business strategy courses via specially designed courses and simulations of emerging economies aid in teaching financial reporting and the analysis of multinational enterprises address the traditional tradeoffs between richness (depth of knowledge) and reach (geographic area coverage)
Developments in information technology are bringing about changes in science education. This Reader focuses on the theoretical and practical consideration of using information and communications technologies in teaching and learning. It examines current approaches to teaching and learning in science at various levels of education, and ways in which science in made more accessible. This will include the future potential of such current developments as access to practical work delivered on the web. The Reader is divided into three sections: What are the current issues in using ICT to teach and learn in science? Designing and evaluating ICT to teach and learn science Extending access to science learning This is a companion book to Reconsidering Science Education, also published by RoutledgeFalmer. Mediating Science Learning Through ICT is a valuable resource for teachers on Masters courses in science education and academics in science education.
Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS.— Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment Who This Book Is For Surveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisions
This research book aims to conceptualise the scale and spectrum of Building Information Modelling (BIM) and Artificial Intelligence (AI) approaches in energy efficient building design and to develop its functional solutions with a focus on four crucial aspects of building envelop, building layout, occupant behaviour and heating, ventilation and air-conditioning (HVAC) systems. Drawn from theoretical development on the sustainability, informatics and optimisation paradigms in built environment, the energy efficient building design will be marked through the power of data and BIM-intelligent agents during the design phase. It will be further developed via smart derivatives to reach a harmony in the systematic integration of energy efficient building design solutions, a gap that is missed in the extant literature and that this book aims to fill. This approach will inform a vision for future and provide a framework to shape and respond to our built environment and how it transforms the way we design and build. By considering the balance of BIM, AI and energy efficient outcomes, the future development of buildings will be regenerated in a direction that is sustainable in the long run. This book is essential reading for those in the AEC industry as well as computer scientists.
Sir Isaac Newton, one of the greatest scientists and mathematicians of all time, introduced the notion of a vector to define the existence of gravitational forces, the motion of the planets around the sun, and the motion of the moon around the earth. Vector calculus is a fundamental scientific tool that allows us to investigate the origins and evolution of space and time, as well as the origins of gravity, electromagnetism, and nuclear forces. Vector calculus is an essential language of mathematical physics, and plays a vital role in differential geometry and studies related to partial differential equations widely used in physics, engineering, fluid flow, electromagnetic fields, and other disciplines. Vector calculus represents physical quantities in two or three-dimensional space, as well as the variations in these quantities. The machinery of differential geometry, of which vector calculus is a subset, is used to understand most of the analytic results in a more general form. Many topics in the physical sciences can be mathematically studied using vector calculus techniques. This book is designed under the assumption that the readers have no prior knowledge of vector calculus. It begins with an introduction to vectors and scalars, and also covers scalar and vector products, vector differentiation and integrals, Gauss's theorem, Stokes's theorem, and Green's theorem. The MATLAB programming is given in the last chapter. This book includes many illustrations, solved examples, practice examples, and multiple-choice questions.
Complete coverage of all objectives in the 2023 release of the CAPM exam Take the Certified Associate in Project Management (CAPM) exam with confidence using this highly effective self-study guide. Written by a project management expert and bestselling author, CAPM Certified Associate in Project Management All-in-One Exam Guide offers complete coverage of every objective on the current version of the test. To help you study, each chapter contains unique design elements that emphasize important points and aid in retention. An appendix, “50 Confusing Terms on the CAPM Exam,” will help you understand the differences in terms that sound similar but have different meanings. In addition, the book includes more than 450 practice questions along with detailed answer explanations. Designed to help you pass the exam with ease, this comprehensive guide also serves as an essential on-the-job reference for project management professionals. Covers all exam topics, including: Project Management Fundamentals and Core Concepts Predictive, Plan-Based Methodologies Agile Frameworks/Methodologies Business Analysis Frameworks Online content includes: Practice exams—test yourself by CAPM exam domain or take a complete exam Printable flash cards, word puzzles, and matching exercises for self-directed learning Printable CAPM memory card for on-the-go study
Did you grow up playing video games when you had to wait online to get them? Do you remember the bad, weird, or otherwise underrated video games of your youth? Did you like a few of them more than your friends did? A Selective History of Bad' Video Games will walk you down memory lane and perform unholy excavations of games you remember, games you've forgotten, and games you never knew you wanted to read about during your lunch break. From a seemingly nude Atari 2600 karate referee to a basketball star doing martial arts to a tiger that speaks broken English and walks through walls, the book will try to uncover what the developers were thinking and occasionally succeed. While there's been some recent coverage of the most famously bad video game E.T. this book starts there and continues on to 40 other curiously (or unsurprisingly) unsuccessful video games during the first few decades of the industry's lifespan. Written by a modern day video game developer, the book explores why these games failed, whether or not they truly deserved it, and what could have made them better. The covered games include screen shots that capture awkward moments, irreverent captions, and pages of tongue-in-cheek psychoanalysis. |
![]() ![]() You may like...
Database Systems - Design…
Carlos Coronel, Steven Morris
Paperback
Applications of Field-Programmable Gate…
Hartmut F.-W. Sadrozinski, Jin Yuan Wu
Hardcover
Problem Solving Cases In Microsoft…
Joseph Brady, Ellen Monk, …
Paperback
|