|
Showing 1 - 25 of
111 matches in All Departments
What if the true weak link of the Information Age force is not the
hardware of machines, but the software of the human mind? And if
so, could it be that the entire conceptual structure of the
Information Revolution theorists, at least as it applies to
military affairs, is built on sand, on the notorious fickleness of
human cognition? These are the questions this book strives to
examine. Looking at the command and control of information-rich
warfare, the contributors explore its potential new processes,
techniques, and organizational structures. As they do so, they find
reasons for both optimism and concerns about the limitations of
human cognition and supporting technologies in commanding battles
in the Information Age. Since the beginning of the Information
Revolution, the military in the United States and elsewhere has
been analyzing and implementing the changes driven by the rapidly
advancing information technologies. Among military theorists and
practitioners, many focus on the Information Revolution's impact on
matters of military equipment. Far fewer, however, seem to worry
about the gray matter—the mind of the commander, the place where
all the information power of the new age is supposed to converge
and to yield its mighty dividends. Consider that it is the human
mind, particularly the minds of military commanders and their
staffs that remain the pinnacle and the ultimate consumer of the
rapidly growing information flows. What if the true weak link of
the Information Age force is not the hardware of machines, but the
software of the human mind? And if so, could it be that the entire
conceptual structure of the Information Revolution theorists, at
least as it applies to military affairs, is built on sand, on the
notorious fickleness of human cognition? These are the questions
this book strives to examine. Looking at the command and control of
information-rich warfare, the authors explore its potential new
processes, techniques, and organizational structures. As they do
so, they find reasons for both optimism and concerns about the
limitations of human cognition and supporting technologies in
commanding Information Age battles.
|
Summit (Hardcover)
Robert Kott
|
R801
R682
Discovery Miles 6 820
Save R119 (15%)
|
Ships in 10 - 15 working days
|
This book introduces fundamental concepts of cyber resilience,
drawing expertise from academia, industry, and government.
Resilience is defined as the ability to recover from or easily
adjust to shocks and stresses. Unlike the concept of security -
which is often and incorrectly conflated with resilience --
resilience refers to the system's ability to recover or regenerate
its performance after an unexpected impact produces a degradation
in its performance. A clear understanding of distinction between
security, risk and resilience is important for developing
appropriate management of cyber threats. The book presents
insightful discussion of the most current technical issues in cyber
resilience, along with relevant methods and procedures. Practical
aspects of current cyber resilience practices and techniques are
described as they are now, and as they are likely to remain in the
near term. The bulk of the material is presented in the book in a
way that is easily accessible to non-specialists. Logical,
consistent, and continuous discourse covering all key topics
relevant to the field will be of use as teaching material as well
as source of emerging scholarship in the field. A typical chapter
provides introductory, tutorial-like material, detailed examples,
in-depth elaboration of a selected technical approach, and a
concise summary of key ideas.
|
Go Fetch (Game)
Megan Lynn Kott
|
R345
R282
Discovery Miles 2 820
Save R63 (18%)
|
Ships in 5 - 10 working days
|
Send players to "fetch" adorable pups in this dog-filled twist on
Go Fish! Adorably illustrated dogs meet a classic card game in Go
Fetch! Each turn, players try and collect matching pups, and if a
player is asked for a card that they don't have, they send their
opponent to the deck for a new card with the declaration: "Go
Fetch!" This travel-friendly tin includes a classic 52-card deck
with adorable illustrations from Megan Lynn Kott, and instructions
for this puppy-filled game for children and adults alike. EASY FOR
ALL AGES: Have fun collecting sets of cute dogs, from Pebbles the
Pug to Tulip the Corgi! Cards include both numbers and names to
help young players match their pups. PERFECT GIFT FOR DOG LOVERS:
Go Fetch makes an ideal stocking stuffer or gift for your dog
walker, doggy daycare, or puppy fans of any age. INCLUDES: Deck of
52 standard playing cards, named and numbered 1-12, with four suits
(stick, ball, disc, and bone). Also includes instruction card. For
ages 4+, 2-6 players. Perfect for: Dog-lovers ages 4+; Anyone
seeking a family game to play at home, during holidays, camping,
traveling, and more.
This book explores cybersecurity research and development efforts,
including ideas that deal with the growing challenge of how
computing engineering can merge with neuroscience. The contributing
authors, who are renowned leaders in this field, thoroughly examine
new technologies that will automate security procedures and perform
autonomous functions with decision making capabilities. To maximize
reader insight into the range of professions dealing with increased
cybersecurity issues, this book presents work performed by
government, industry, and academic research institutions working at
the frontier of cybersecurity and network sciences. Cybersecurity
Systems for Human Cognition Augmentation is designed as a reference
for practitioners or government employees working in cybersecurity.
Advanced-level students or researchers focused on computer
engineering or neuroscience will also find this book a useful
resource.
This book provides a comprehensive overview of the fundamental
security of Industrial Control Systems (ICSs), including
Supervisory Control and Data Acquisition (SCADA) systems and
touching on cyber-physical systems in general. Careful attention is
given to providing the reader with clear and comprehensive
background and reference material for each topic pertinent to ICS
security. This book offers answers to such questions as: Which
specific operating and security issues may lead to a loss of
efficiency and operation? What methods can be used to monitor and
protect my system? How can I design my system to reduce
threats?This book offers chapters on ICS cyber threats, attacks,
metrics, risk, situational awareness, intrusion detection, and
security testing, providing an advantageous reference set for
current system owners who wish to securely configure and operate
their ICSs. This book is appropriate for non-specialists as well.
Tutorial information is provided in two initial chapters and in the
beginnings of other chapters as needed. The book concludes with
advanced topics on ICS governance, responses to attacks on ICS, and
future security of the Internet of Things.
This entertaining modern twist to the classic tarot combines
authenticity with a feline sense of humor in a complete deck for
experienced and new readers alike, including 78 tarot cards and a
guidebook on how to get the most out of the cat's wisdom.
A multi cultural collection of third-wave feminist voices, this
book reveals how current feminist religious scholars from around
the world are integrating social justice and activism into their
scholarship and pedagogy.
This book is the first publication to give a comprehensive,
structured treatment to the important topic of situational
awareness in cyber defense. It presents the subject in a logical,
consistent, continuous discourse, covering key topics such as
formation of cyber situational awareness, visualization and human
factors, automated learning and inference, use of ontologies and
metrics, predicting and assessing impact of cyber attacks, and
achieving resilience of cyber and physical mission. Chapters
include case studies, recent research results and practical
insights described specifically for this book. Situational
awareness is exceptionally prominent in the field of cyber defense.
It involves science, technology and practice of perception,
comprehension and projection of events and entities in cyber space.
Chapters discuss the difficulties of achieving cyber situational
awareness - along with approaches to overcoming the difficulties -
in the relatively young field of cyber defense where key phenomena
are so unlike the more conventional physical world. Cyber Defense
and Situational Awareness is designed as a reference for
practitioners of cyber security and developers of technology
solutions for cyber defenders. Advanced-level students and
researchers focused on security of computer networks will also find
this book a valuable resource.
In just over a century, Latvia has transitioned from imperial
periphery to nation-state, then Soviet republic, and finally
following the collapse of the Soviet Union to an independent
republic. Defining Latvia brings together the latest research on
the multiple social, political, and cultural contexts of Latvia
throughout this turbulent period. Its ten chapters are written by
leading political scientists, historians, and area studies
specialists from across Europe and North America. The volume moves
beyond an exclusively political context to incorporate a variety of
social and cultural perspectives, ranging from the experiences of
Latvian mapmakers in the Russian Empire, to the participation of
Latvians in the Wehrmacht and Red Army during World War II, Latvian
national communism, and the development of extremist politics
following Latvia's accession to the European Union. Other chapters
address developing trends in the fields of history and political
science, including the history of antisemitism, memory, language
politics, photography, and political extremism. Based on the book's
temporal span from the nineteenth century to the present, the
authors and editors of Defining Latvia understand the construction
of Latvian identity as a continuous and interconnected process
across significant political and ideological ruptures.
From beloved artist Megan Lynn Kott, this beautifully illustrated
deck is a celebration of fungi and their age-old wisdom. Complete
with seventy-eight cards, each featuring a watercolor painting of a
mushroom on the front and an engaging description on the
back-including identifying characteristics, fun facts, and a dash
of mystical mushroom wisdom-this deck is an invitation to notice
and appreciate the mysterious world of fungi. An accompanying
booklet includes a brief introduction to mushrooms, a glossary of
terms, plus guidance on how to use cards-display them as art or
keep them on hand during your nature walks! Packaged in an
attractive, portable box, this playful and informative deck is a
must-have for mushroom lovers of all stripes.
From the past hidden in their paws to the future predicted by their
leftover kibble, discover the true magic of cats in this hilarious
guide to feline divination. Pawmistry is a tongue-in-cheek guide to
the feline oracle and the supernatural signs your cat may leave
behind. Written and illustrated by the beloved creator of Cat Tarot
Megan Lynn Kott, this playful and informative book offers
instruction in a number of types of divination to practice with
your cat, where messages and portents may be delivered by scattered
cat toys, particular tail positions, and sleeping on your face.
What does that barf in your shoe really mean? You may even consider
learning the dark magic of their litterbox leavings (if you dare).
Each section includes write-in pages to record your own cat's
messages from the universe, and a removable, fold-out Feline
Divination Board included with the book will allow you to take your
arcane partnership to the next level. MAKE CAT PLAY TIME PAWMISTRY
TIME: Using the easy step-by-step instructions, turn your cat's
daily routine into opportunities for mystical discovery. Play with
toys to consult the oracles! Discover messages from the universe in
leftover kibble! Dare to read the dark portents hidden in their
litterbox! FOR CAT LOVERS: This is a unique gift for the "crazy cat
person" in your life-even if it's yourself! Learn the mystical
meanings behind the "slow blink" or the past hidden in your kitty's
bean toes, and celebrate the magic of cats. DIY SHAREABLE CONTENT:
Along with playful instructions and illustrations, the book also
includes a fold-out Feline Divination Board-a talking board for
cats-which not only makes for a fun interactive element, but also a
perfect photo opportunity to share with friends. GREAT GIFT: This
playful book is perfect for a birthday present, white elephant gift
exchange, or to celebrate a new cat adoption. Add it to the shelf
alongside You Need More Sleep: Advice From Cats by Francesco
Marciuliano, Ask Baba Yaga by Taisia Kitaiskaia, and Crafting with
Cat Hair by Kaori Tsutaya and Amy Hirschman.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
The rising tide of threats, from financial cybercrime to asymmetric
military conflicts, demands greater sophistication in tools and
techniques of law enforcement, commercial and domestic security
professionals, and terrorism prevention. Concentrating on
computational solutions to determine or anticipate an adversary's
intent, Adversarial Reasoning: Computational Approaches to Reading
the Opponent's Mind discusses the technologies for opponent
strategy prediction, plan recognition, deception discovery and
planning, and strategy formulation that not only applies to
security issues but also to game industry and business
transactions. Addressing a broad range of practical problems,
including military planning and command, military and foreign
intelligence, antiterrorism, network security, as well as
simulation and training systems, this reference presents an
overview of each problem and then explores various approaches and
applications to understand the minds and negate the actions of your
opponents. The techniques discussed originate from a variety of
disciplines such as stochastic processes, artificial intelligence
planning, cognitive modeling, robotics and agent theory, robust
control, game theory, and machine learning, among others. The
beginning chapters outline the key concepts related to discovering
the opponent's intent and plans while the later chapters journey
into mathematical methods for counterdeception. The final chapters
employ a range of techniques, including reinforcement learning
within a stochastic dynamic games context to devise strategies that
combat opponents. By answering specific questions on how to create
practical applications that require elements of
adversarialreasoning while also exploring theoretical developments,
Adversarial Reasoning: Computational Approaches to Reading the
Opponent's Mind is beneficial for practitioners as well as
researchers.
Sociological theories of crime include: theories of strain blame
crime on personal stressors; theories of social learning blame
crime on its social rewards, and see crime more as an institution
in conflict with other institutions rather than as in- vidual
deviance; and theories of control look at crime as natural and
rewarding, and explore the formation of institutions that control
crime. Theorists of corruption generally agree that corruption is
an expression of the Patron-Client relationship in which a person
with access to resources trades resources with kin and members of
the community in exchange for loyalty. Some approaches to modeling
crime and corruption do not involve an explicit simulation: rule
based systems; Bayesian networks; game theoretic approaches, often
based on rational choice theory; and Neoclassical Econometrics, a
rational choice-based approach. Simulation-based approaches take
into account greater complexities of interacting parts of social
phenomena. These include fuzzy cognitive maps and fuzzy rule sets
that may incorporate feedback; and agent-based simulation, which
can go a step farther by computing new social structures not
previously identified in theory. The latter include cognitive agent
models, in which agents learn how to perceive their en- ronment and
act upon the perceptions of their individual experiences; and
reactive agent simulation, which, while less capable than
cognitive-agent simulation, is adequate for testing a policy's
effects with existing societal structures. For example, NNL is a
cognitive agent model based on the REPAST Simphony toolkit.
This book is a comprehensive compilation of modern and cutting-edge
chromatographic techniques written by pharmaceutical industry
experts, academics, and vendors in the field. This book is an
inclusive guide to developing all chromatographic methods (such as
liquid chromatography and gas chromatography). It covers modern
techniques for developing methods using chromatographic development
software, requirements for validations, discussion on
orthogonality, and how to transfer methods from HPLC to UHPLC. The
text introduces some newer techniques that are heavily employed by
chemists analyzing proteins and RNAi, as well as novel techniques
such as counter current chromatography. This book is valuable for
both the novice starting out in undergraduate labs and those who
are new to the pharmaceutical industry and is a useful reference
for seasoned analysts.
The idea of planning economy and engineering social life has often
been linked with Communist regimes' will of control. However, the
persuasion that social and economic processes could and should be
regulated was by no means limited to them. Intense debates on these
issues developed already during the First World War in Europe and
became globalized during the World Economic crisis. During the Cold
War, such discussions fuelled competition between two models of
economic and social organisation but they also revealed the
convergences and complementarities between them. This ambiguity, so
often overlooked in histories of the Cold War, represents the
central issue of the book organized around three axes. First, it
highlights how know-how on planning circulated globally and were
exchanged by looking at international platforms and organizations.
The volume then closely examines specificities of planning ideas
and projects in the Communist and Capitalist World. Finally, it
explores East-West channels generated by exchanges around issues of
planning which functioned irrespective of the Iron Curtain and were
exported in developing countries. The volume thus contributes to
two fields undergoing a process of profound reassessment: the
history of modernisation and of the Cold War.
Add some FUNgi to your correspondence! This set of all-occasion
notecards features beloved artist Megan Lynn Kott's beautiful
watercolor illustrations of mushrooms. Ten designs, repeat twice.
|
|