|
Showing 1 - 25 of
126 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
This book provides a valuable reference for digital forensics
practitioners and cyber security experts operating in various
fields of law enforcement, incident response and commerce. It is
also aimed at researchers seeking to obtain a more profound
knowledge of Digital Forensics and Cybercrime. Furthermore, the
book is an exceptional advanced text for PhD and Master degree
programmes in Digital Forensics and Cyber Security. Each chapter of
this book is written by an internationally-renowned expert who has
extensive experience in law enforcement, industry and academia. The
increasing popularity in the use of IoT devices for criminal
activities means that there is a maturing discipline and industry
around IoT forensics. As technology becomes cheaper and easier to
deploy in an increased number of discrete, everyday objects, scope
for the automated creation of personalised digital footprints
becomes greater. Devices which are presently included within the
Internet of Things (IoT) umbrella have a massive potential to
enable and shape the way that humans interact and achieve
objectives. These also forge a trail of data that can be used to
triangulate and identify individuals and their actions. As such,
interest and developments in autonomous vehicles, unmanned drones
and 'smart' home appliances are creating unprecedented
opportunities for the research communities to investigate the
production and evaluation of evidence through the discipline of
digital forensics.
Over the past two decades, we have witnessed unprecedented
innovations in the development of miniaturized electromechanical
devices and low-power wireless communication making practical the
embedding of networked computational devices into a rapidly
widening range of material entities.
This trend has enabled the coupling of physical objects and digital
information into cyber-physical systems and it is widely expected
to revolutionize the way resource computational consumption and
provision will occur. Specifically, one of the core ingredients of
this vision, the so-called Internet of Things (IoT), demands the
provision of networked services to support interaction between
conventional IT systems with both physical and artificial objects.
In this way, IoT is seen as a combination of several emerging
technologies, which enables the transformation of everyday objects
into smart objects. It is also perceived as a paradigm that
connects real world with digital world.
The focus of this book is exactly on the novel collective and
computational intelligence technologies that will be required to
achieve this goal. While, one of the aims of this book is to
discuss the progress made, it also prompts future directions on the
utilization of inter-operable and cooperative next generation
computational technologies, which supports the IoT approach, that
being an advanced functioning towards an integrated collective
intelligence approach for the benefit of various organizational
settings.
This professional guide and reference examines the challenges of
assessing security vulnerabilities in computing infrastructure.
Various aspects of vulnerability assessment are covered in detail,
including recent advancements in reducing the requirement for
expert knowledge through novel applications of artificial
intelligence. The work also offers a series of case studies on how
to develop and perform vulnerability assessment techniques using
start-of-the-art intelligent mechanisms. Topics and features:
provides tutorial activities and thought-provoking questions in
each chapter, together with numerous case studies; introduces the
fundamentals of vulnerability assessment, and reviews the state of
the art of research in this area; discusses vulnerability
assessment frameworks, including frameworks for industrial control
and cloud systems; examines a range of applications that make use
of artificial intelligence to enhance the vulnerability assessment
processes; presents visualisation techniques that can be used to
assist the vulnerability assessment process. In addition to serving
the needs of security practitioners and researchers, this
accessible volume is also ideal for students and instructors
seeking a primer on artificial intelligence for vulnerability
assessment, or a supplementary text for courses on computer
security, networking, and artificial intelligence.
This account of the Gulf War reveals its importance from a
military and political point of view, highlighting how modern
military technology made possible, with relative ease, a victory
that would have been nearly impossible by traditional means. It has
become fashionable to trivialize the impressive military
achievements of the Coatition victory over Iraq, but Bin, Hill, and
Jones demonstrate that the Gulf War represents a defining moment in
military and political history. The text includes numerous
firsthand eyewitness accounts.
Readers will discover why a multinational coalition deployed
800,000 soldiers to the Middle East to challenge to the Iraqi
invasion of Kuwait. They will find out the truth behind political
maneuvering by nations involved in the conflict, as well as those
on the sidelines, and they will learn the details of the various
weapons systems employed. The authors analyze the aftermath of the
war and draw important lessons from it. This book provides an
authoritative and provocative review of what will surely be
remembered as one of the key events of the last half century.
This volume offers a close look at four cases of indigenous
language revitalization: Maori in Aotearoa/New Zealand, Saami in
Scandinavia, Hnahno in Mexico and Quechua and other indigenous
languages in Latin America. Starting from the premise than
indigenous language revitalization is worth doing, the authors
focus on HOW to do indigenous revitalization, and in particular,
the role of schools in that endeavor. Essays by experts from each
case are in turn discussed in international perspective by four
counterpart experts.
This textbook describes the hands-on application of data science
techniques to solve problems in manufacturing and the Industrial
Internet of Things (IIoT). Monitoring and managing operational
performance is a crucial activity for industrial and business
organisations. The emergence of low-cost, accessible computing and
storage, through Industrial Digital Technologies (IDT) and Industry
4.0, has generated considerable interest in innovative approaches
to doing more with data. Data science, predictive analytics,
machine learning, artificial intelligence and general approaches to
modelling, simulating and visualising industrial systems have often
been considered topics only for research labs and academic
departments. This textbook debunks the mystique around applied data
science and shows readers, using tutorial-style explanations and
real-life case studies, how practitioners can develop their own
understanding of performance to achieve tangible business
improvements. All exercises can be completed with commonly
available tools, many of which are free to install and use. Readers
will learn how to use tools to investigate, diagnose, propose and
implement analytics solutions that will provide explainable results
to deliver digital transformation.
This book provides a clear and thorough account of the process
leading up to the revision of the International Telecommunication
Regulations (ITRs) one of the four treaties administered by the
ITU. The author's inside view of the events and his legal analysis
of the new ITRs, are different from that what has been aired in
most other accounts to date. His systematic approach shows how much
of the criticism of the WCIT-12 process and of the ITRs themselves,
is unjustified. This book provides the most accurate view to date
of what theITRs really mean and of what really happened at WCIT-12,
which was undoubtedly a key event in the history of
telecommunication policy and which is likely to have significant
long-term effects.
The book covers in some detail the events leading to the
non-signature of the treaty by a significant number of states,
outlines possible consequences of that split between states, and
offers possible ways forward. The book includes a detailed
article-by-article analysis of the new ITRs, explaining their
implications and concludes with recommendations for national
authorities. It concludes with an analysis of events from the point
of view of dispute resolution theory, offering suggestions for how
to avoid divisive outcomes in the future.
"This is an excellent book, and quite rich and comprehensive.
The topic is important and the book will surely be of interest to
regulators, diplomats, policy experts, and all those who
participated in WCIT. The author is uniquely qualified to write an
analysis of the new ITRs and an account of the Conference. This
book will be a good reference for the next Plenipotentiary
Conference to be held in 2014 which is going to discuss follow-up
to WCIT-12." Naser al-Rashedi, United Arab Emirates.
"This is an authoritative expert account of a moment of high
significance for vital issues with respect to international
networks." Professor Dan Schiller, University of Illinois.
"This is an excellent and timely work." Professor Ian Walden,
Queen Mary, University of London.
"Interested persons, businesses and governments can draw their
policies from the assessments of a telecommunications insider as
presented in this book.
The manifold arguments enlightening the interpretation of the
provisions of the ITRs might become an invaluable guidance for
those who apply the ITRs in the future."
Professor Dr. Rolf H. Weber, University of Zurich."
This book reviews the theoretical concepts, leading-edge techniques
and practical tools involved in the latest multi-disciplinary
approaches addressing the challenges of big data. Illuminating
perspectives from both academia and industry are presented by an
international selection of experts in big data science. Topics and
features: describes the innovative advances in theoretical aspects
of big data, predictive analytics and cloud-based architectures;
examines the applications and implementations that utilize big data
in cloud architectures; surveys the state of the art in
architectural approaches to the provision of cloud-based big data
analytics functions; identifies potential research directions and
technologies to facilitate the realization of emerging business
models through big data approaches; provides relevant theoretical
frameworks, empirical research findings, and numerous case studies;
discusses real-world applications of algorithms and techniques to
address the challenges of big datasets.
Comprehensive, contemporary, and engaging, Animal Physiology
provides evolutionary and ecological context to help students make
connections across all levels of physiological scale. One of the
major challenges instructors and students face in Animal Physiology
is making connections across levels of biological scale. Animal
Physiology addresses this challenge by providing ecological and
evolutionary context to the study of physiology at all levels of
organization: genome, molecular biology, biochemistry, cells,
tissues, organs, and organ systems. Hill's inclusion of ecology and
evolution helps readers gain a holistic perspective on animal
function and sets Animal Physiology apart from texts that focus
more narrowly on physiology. Hill's Animal Physiology is trusted by
instructors and students because of its authoritative, current,
engaging, and lavishly illustrated presentation.
A dictionary containing over 1900 biographical notices of Sudanese
and foreign persons who died before 1948.
This important text provides a single point of reference for
state-of-the-art cloud computing design and implementation
techniques. The book examines cloud computing from the perspective
of enterprise architecture, asking the question; how do we realize
new business potential with our existing enterprises? Topics and
features: with a Foreword by Thomas Erl; contains contributions
from an international selection of preeminent experts; presents the
state-of-the-art in enterprise architecture approaches with respect
to cloud computing models, frameworks, technologies, and
applications; discusses potential research directions, and
technologies to facilitate the realization of emerging business
models through enterprise architecture approaches; provides
relevant theoretical frameworks, and the latest empirical research
findings.
The indie game developer's complete guide to running a studio. The
climate for the games industry has never been hotter, and this is
only set to continue as the marketplace for tablets, consoles and
phones grow. Seemingly every day there is a story of how a
successful app or game has earned thousands of downloads and
revenue. As the market size increases, so does the number of people
developing and looking to develop their own app or game to publish.
The Indie Game Developer Handbook covers every aspect of running a
game development studio from the initial creation of the game
through to completion, release and beyond. Accessible and complete
guide to many aspects of running a game development studio from
funding and development through QA, publishing, marketing, and
more. Provides a useful knowledge base and help to support the
learning process of running an indie development studio in an
honest, approachable and easy to understand way. Case studies,
interviews from other studies and industry professionals grant an
first-hand look into the world of indie game development
|
|