Browse Results

Showing 18,801 through 18,825 of 54,022 results

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics)

by Anand Handa Rohit Negi S. Venkatesan Sandeep K. Shukla

Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

The Multimediated Rhetoric of the Internet: Digital Fusion (Routledge Studies in Rhetoric and Communication #10)

by Carolyn Handa

This project is a critical, rhetorical study of the digital text we call the Internet, in particular the style and figurative surface of its many pages as well as the conceptual, design patterns structuring the content of those same pages. Handa argues that as our lives become increasingly digital, we must consider rhetoric applicable to more than just printed text or to images. Digital analysis demands our acknowledgement of digital fusion, a true merging of analytic skills in many media and dimensions. CDs, DVDs, and an Internet increasingly capable of streaming audio and video prove that literacy today means more than it used to, namely the ability to understand information, however presented. Handa considers pedagogy, professional writing, hypertext theory, rhetorical studies, and composition studies, moving analysis beyond merely "using" the web towards "thinking" rhetorically about its construction and its impact on culture. This book shows how analyzing the web rhetorically helps us to understand the inescapable fact that culture is reflected through all media fused within the parameters of digital technology.

Apache Solr for Indexing Data

by Sachin Handiekar Anshul Johri

Enhance your Solr indexing experience with advanced techniques and the built-in functionalities available in Apache Solr About This Book * Learn about distributed indexing and real-time optimization to change index data on fly * Index data from various sources and web crawlers using built-in analyzers and tokenizers * This step-by-step guide is packed with real-life examples on indexing data Who This Book Is For This book is for developers who want to increase their experience of indexing in Solr by learning about the various index handlers, analyzers, and methods available in Solr. Beginner level Solr development skills are expected. What You Will Learn * Get to know the basic features of Solr indexing and the analyzers/tokenizers available * Index XML/JSON data in Solr using the HTTP Post tool and CURL command * Work with Data Import Handler to index data from a database * Use Apache Tika with Solr to index word documents, PDFs, and much more * Utilize Apache Nutch and Solr integration to index crawled data from web pages * Update indexes in real-time data feeds * Discover techniques to index multi-language and distributed data in Solr * Combine the various indexing techniques into a real-life working example of an online shopping web application In Detail Apache Solr is a widely used, open source enterprise search server that delivers powerful indexing and searching features. These features help fetch relevant information from various sources and documentation. Solr also combines with other open source tools such as Apache Tika and Apache Nutch to provide more powerful features. This fast-paced guide starts by helping you set up Solr and get acquainted with its basic building blocks, to give you a better understanding of Solr indexing. You'll quickly move on to indexing text and boosting the indexing time. Next, you'll focus on basic indexing techniques, various index handlers designed to modify documents, and indexing a structured data source through Data Import Handler. Moving on, you will learn techniques to perform real-time indexing and atomic updates, as well as more advanced indexing techniques such as de-duplication. Later on, we'll help you set up a cluster of Solr servers that combine fault tolerance and high availability. You will also gain insights into working scenarios of different aspects of Solr and how to use Solr with e-commerce data. By the end of the book, you will be competent and confident working with indexing and will have a good knowledge base to efficiently program elements. Style and approach This fast-paced guide is packed with examples that are written in an easy-to-follow style, and are accompanied by detailed explanation. Working examples are included to help you get better results for your applications.

Einführung in die Statistik: Theorie und Praxis mit R

by Andreas Handl Torben Kuhlenkasper

Dieses Lehrbuch motiviert und erklärt die Inhalte der deskriptiven und induktiven Statistik, indem es die mathematischen Grundlagen der Statistik mit vielfältigen, leicht nachvollziehbaren Anwendungen und Beispielen verbindet: Durch überschaubare Beispiele, die mit Papier und Stift durchgerechnet werden können (und sollten!) gewinnt der Leser zunächst Verständnis und einen routinierten Umgang mit den zentralen Formeln. Für größere Beispiele kommt das frei verfügbare statistische Software R zum Einsatz, welches die Berechnungen schnell und verlässlich auch für große Datensätze umsetzt.

Parallel Problem Solving from Nature – PPSN XIV

by Julia Handl Emma Hart Peter R. Lewis Manuel López-Ibáñez Gabriela Ochoa Ben Paechter

This book constitutes the refereed proceedings of the 14th International Conference on Parallel Problem Solving from Nature, PPSN 2016, held in Edinburgh, UK, in September 2016. The total of 93 revised full papers were carefully reviewed and selected from 224 submissions. The meeting began with four workshops which offered an ideal opportunity to explore specific topics in intelligent transportation Workshop, landscape-aware heuristic search, natural computing in scheduling and timetabling, and advances in multi-modal optimization. PPSN XIV also included sixteen free tutorials to give us all the opportunity to learn about new aspects: gray box optimization in theory; theory of evolutionary computation; graph-based and cartesian genetic programming; theory of parallel evolutionary algorithms; promoting diversity in evolutionary optimization: why and how; evolutionary multi-objective optimization; intelligent systems for smart cities; advances on multi-modal optimization; evolutionary computation in cryptography; evolutionary robotics - a practical guide to experiment with real hardware; evolutionary algorithms and hyper-heuristics; a bridge between optimization over manifolds and evolutionary computation; implementing evolutionary algorithms in the cloud; the attainment function approach to performance evaluation in EMO; runtime analysis of evolutionary algorithms: basic introduction; meta-model assisted (evolutionary) optimization. The papers are organized in topical sections on adaption, self-adaption and parameter tuning; differential evolution and swarm intelligence; dynamic, uncertain and constrained environments; genetic programming; multi-objective, many-objective and multi-level optimization; parallel algorithms and hardware issues; real-word applications and modeling; theory; diversity and landscape analysis.

Don't Teach Coding: Until You Read This Book

by Lindsey D. Handley Stephen R. Foster

The definitive resource for understanding what coding is, designed for educators and parents Even though the vast majority of teachers, parents, and students understand the importance of computer science in the 21st century, many struggle to find appropriate educational resources. Don't Teach Coding: Until You Read This Book fills a gap in current knowledge by explaining exactly what coding is and addressing why and how to teach the subject. Providing a historically grounded, philosophically sensitive description of computer coding, this book helps readers understand the best practices for teaching computer science to their students and their children. The authors, experts in teaching computer sciences to students of all ages, offer practical insights on whether coding is a field for everyone, as opposed to a field reserved for specialists. This innovative book provides an overview of recent scientific research on how the brain learns coding, and features practical exercises that strengthen coding skills. Clear, straightforward chapters discuss a broad range of questions using principles of computer science, such as why we should teach students to code and is coding a science, engineering, technology, mathematics, or language? Helping readers understand the principles and issues of coding education, this book: Helps those with no previous background in computer science education understand the questions and debates within the field Explores the history of computer science education and its influence on the present Views teaching practices through a computational lens Addresses why many schools fail to teach computer science adequately Explains contemporary issues in computer science such as the language wars and trends that equate coding with essential life skills like reading and writing Don't Teach Coding: Until You Read This Book is a valuable resource for K-12 educators in computer science education and parents wishing to understand the field to help chart their children’s education path.

Topics in Cryptology – CT-RSA 2017

by Helena Handschuh

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14084)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14082)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V (Lecture Notes in Computer Science #14085)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14081)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14083)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Adaptive Middleware for the Internet of Things: The GAMBAS Approach

by Marcus Handte Pedro José Marrón Gregor Schiele Matoses Manuel Serrano

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include:Behavior-driven Autonomous ServicesGAMBAS Middleware ArchitectureGeneric and Efficient Data AcquisitionInteroperable and Scalable Data ProcessingAutomated Privacy PreservationAdaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.

Knowledge Management, Arts, and Humanities: Interdisciplinary Approaches and the Benefits of Collaboration (Knowledge Management and Organizational Learning #7)

by Meliha Handzic Daniela Carlucci

This book presents a series of studies that demonstrate the value of interactions between knowledge management with the arts and humanities. The carefully compiled chapters show, on the one hand, how traditional methods from the arts and humanities – e.g. theatrical improvisation, clay modelling, theory of aesthetics – can be used to enhance knowledge creation and evolution. On the other, the chapters discuss knowledge management models and practices such as virtual knowledge space (BA) design, social networking and knowledge sharing, data mining and knowledge discovery tools. The book also demonstrates how these practices can yield valuable benefits in terms of organizing and analyzing big arts and humanities data in a digital environment.

Build Your Own PaaS with Docker

by Oskar Hane

This book is intended for those who want to take full advantage of separating services into module containers and connect them to form a complete platform. It will give you all the insights and knowledge needed to run your own PaaS.

Cyber Kids, Cyber Bullying, Cyber Balance

by Constance Hanel Barbara C. Trolley

Emphasizing prevention, assessment, and evaluation, this proactive guide shows how to advance learning, reduce cyber bullying, and improve school climate by helping students use technology responsibly.

Artificial Intelligence and Its Discontents: Critiques from the Social Sciences and Humanities (Social and Cultural Studies of Robots and AI)

by Ariane Hanemaayer

On what basis can we challenge Artificial Intelligence (AI) - its infusion, investment, and implementation across the globe? This book answers this question by drawing on a range of critical approaches from the social sciences and humanities, including posthumanism, ethics and human values, surveillance studies, Black feminism, and other strategies for social and political resistance. The authors analyse timely topics, including bias and language processing, responsibility and machine learning, COVID-19 and AI in health technologies, bio-AI and nanotechnology, digital ethics, AI and the gig economy, representations of AI in literature and culture, and many more. This book is for those who are currently working in the field of AI critique and disruption as well as in AI development and programming. It is also for those who want to learn more about how to doubt, question, challenge, reject, reform and otherwise reprise AI as it been practiced and promoted.

Game Development with Swift

by Stephen Haney

If you wish to create and publish fun iOS games using Swift, then this book is for you. You should be familiar with basic programming concepts. However, no prior game development or Apple ecosystem experience is required.

Swift 3 Game Development - Second Edition

by Stephen Haney

Embrace the mobile gaming revolution by creating popular iOS games with Swift 3.0 About This Book • Create and design games for iPhone and iPad using SpriteKit and Swift 3.0 • Learn the core fundamentals of SpriteKit game development and mix and match techniques to customize your game • This step-by-step practical guide will teach you to build games from scratch using little-known tips and strategies for maximum fun Who This Book Is For If you wish to create and publish fun iOS games using Swift, then this book is for you. You should be familiar with basic programming concepts. However, no prior game development or Apple ecosystem experience is required. What You Will Learn • Deliver powerful graphics, physics, and sound in your game by using SpriteKit • Set up the scene using the new capabilities of the scene editor and custom classes • Maximize gameplay with little-known tips and strategies for fun and repeatable action • Make use of animations, graphics, and particles to polish your game • Understand the current mobile monetization landscape to choose the best option for your own situation • Integrate your game with Game Center so that your players can share their high scores and achievements • Publish your game to the App Store and enjoy people playing your games In Detail Swift is the perfect choice for game development. Developers are intrigued by Swift 3.0 and want to make use of new features to develop their best games yet. Packed with best practices and easy-to-use examples, this book leads you step by step through the development of your first Swift game. This book starts by introducing SpriteKit and Swift's new features that can be used for game development. After setting up your first Swift project, you will build your first custom class, learn how to draw and animate your game, and add physics simulations. Then, you will add the player character, NPCs, and powerups. To make your game more fun and engaging, you will learn how to set up scenes and backgrounds, build fun menus, and integrate with Apple Game Center to add leaderboards and achievements. You will then make your game stand out by adding animations when game objects collide, and incorporate proven techniques such as the advanced particle system and graphics. Finally, you will explore the various options available to start down the path towards monetization and publish your finished games to the App Store. By the end of this book, you will be able to create your own iOS games using Swift and SpriteKit. Style and approach This project-based guide is engaging with a visually-rich approach rather than a text-heavy approach. With every chapter containing practical examples, you will understand how Swift programming works and make the most of the new features in version 3.0.

Analogue Quantum Simulation: A New Instrument for Scientific Understanding

by Dominik Hangleiter Jacques Carolan Karim P. Thébault

This book presents fresh insights into analogue quantum simulation. It argues that these simulations are a new instrument of science. They require a bespoke philosophical analysis, sensitive to both the similarities to and the differences with conventional scientific practices such as analogical argument, experimentation, and classical simulation.The analysis situates the various forms of analogue quantum simulation on the methodological map of modern science. In doing so, it clarifies the functions that analogue quantum simulation serves in scientific practice. To this end, the authors introduce a number of important terminological distinctions. They establish that analogue quantum ‘computation' and ‘emulation' are distinct scientific practices and lead to distinct forms of scientific understanding. The authors also demonstrate the normative value of the computation vs. emulation distinction at both an epistemic and a pragmatic level.The volume features a range of detailed case studies focusing on: i) cold atom computation of many-body localisation and the Higgs mode; ii) photonic emulation of quantum effects in biological systems; and iii) emulation of Hawing radiation in dispersive optical media. Overall, readers will discover a normative framework to isolate and support the goals of scientists undertaking analogue quantum simulation and emulation. This framework will prove useful to both working scientists and philosophers of science interested in cutting-edge scientific practice.

Recent Advances in Electrical and Information Technologies for Sustainable Development: Proceedings of the 3rd International Conference on Electrical and Information Technologies — ICEIT 2017, Morocco (Advances in Science, Technology & Innovation)

by Soumia El Hani Mohamad Essaaidi

The book includes the best extended papers which were selected from the 3rd International Conference of Electrical and Information Technologies (ICEIT 2017, Morocco). The book spans two inter-related research domains which shaped modern societies, solved many of their development problems, and contributed to their unprecedented economic growth and social welfare. Selected papers are based on original and high quality research. They were peer reviewed by experts in the field. They are grouped into five parts. Part I deals with Power System and Electronics topics that include Power Electronics & Energy Conversion, Actuators & Micro/Nanotechnology, etc. Part II relates to Control Systems and their applications. Part III concerns the topic of Information Technology that basically includes Smart Grid, Information Security, Cloud Computing Distributed, Big Data, etc. Part IV discusses Telecommunications and Vehicular Technologies topics that include, Green Networking and Communications, Wireless Ad-hoc and Sensor Networks, etc. Part V covers Green Applications and Interdisciplinary topics, that include intelligent and Green Technologies for Transportation Systems, Smart Cities, etc. This book offers a good opportunity for young researchers, novice scholars and whole academic sphere to explore new trends in Electrical and information Technologies.

A Cursed Place: A page-turning thriller of the dark world of cyber surveillance (William Carver Novels)

by Peter Hanington

Reporter William Carver comes up against Big Tech's manipulation and suppression of truth from the mines of Chile to the turbulent streets of Hong Kong.Knowledge is power. And they know everything.The tech company Public Square believes in 'doing well by doing good'. It's built a multi-billion dollar business on this philosophy and by getting to know what people want. They know a lot. But who else can access all that information and what are they planning to do with it?Reporter William Carver is an analogue man in a digital world. He isn't the most tech-savvy reporter, he's definitely old school, but he needs to learn fast - the people he cares most about are in harm's way.From the Chilean mines where they dig for raw materials that enable the tech revolution, to the streets of Hong Kong where anti-government protesters are fighting against the Chinese State, to the shiny research laboratories of Silicon Valley where personal data is being mined everyday - A Cursed Place is a gripping thriller set against the global forces that shape our times.(P) 2021 Hodder & Stoughton

A Cursed Place: A page-turning thriller of the dark world of cyber surveillance (William Carver Novels)

by Peter Hanington

*ONE OF 40 BOOKS FOR SUMMER* 'gripping'- iNews'A panoramic thriller ...chockful of vivid characters.' - THE SUNDAY TIMES'An intriguing, timely and unsettling new thriller' - SAM BOURNE'Exhilarating and beautiful' - AMOL RAJAN'Catapults you from first word to last... pacy, sinister and timely read.' - ALAN JUDD'Another page-turner from a writer who can take you into gripping worlds, real and virtual.' MISHAL HUSAIN 'A terrific thriller - vivid, quick-witted and dynamic, crackling with energy, dread and rage as it crosses continents and digs down into the human heart.' - NICCI GERRARD 'The dark world of private cyber-surveillance crackles off the page - full of jeopardy and suspense.' - ALLAN LITTLE 'A vividly written thriller of ruthless tech entrepreneurs exploiting their surveillance powers and morally compromised journalists feeling their way in the dark towards the truth.' - RORY CELLAN-JONES'Carver is a marvellous creation.' - MIKE RIPLEY, SHOTS MAGKNOWLEDGE IS POWER. AND THEY KNOW EVERYTHING.The tech company Public Square believes in 'doing well by doing good'. It's built a multi-billion dollar business on this philosophy and by getting to know what people want. They know a lot. But who else can access all that information and what are they planning to do with it?Reporter William Carver is an analogue man in a digital world. He isn't the most tech-savvy reporter, he's definitely old school, but he needs to learn fast - the people he cares most about are in harm's way.From the Chilean mines where they dig for raw materials that enable the tech revolution, to the streets of Hong Kong where anti-government protesters are fighting against the Chinese State, to the shiny research laboratories of Silicon Valley where personal data is being mined everyday - A Cursed Place is a gripping thriller set against the global forces that shape our times.'A true page turner - highly recommended'. TORTOISE

Heroku Cloud Application Development

by Anubhav Hanjura

An easy-to-follow, hands-on guide that clearly explains the various components of the Heroku platform and provides step-by-step guidance as well as numerous examples on how to build and troubleshoot robust and scalable production-ready web applications on the Heroku platform. This book is intended for those who want to learn Heroku the right way. Perhaps you are new to Heroku or are someone who has heard about Heroku but have not built anything significant with it. You should have knowledge or familiarity with cloud computing and basic knowledge of database and network deployment.

Airline e-Commerce: Log on. Take off.

by Michael Hanke

From the few tickets that were sold by Alaska Airlines and former British Midland in December 1995 via the industry’s first airline booking engine websites, global online travel has grown to generate today more than half a trillion dollars in annual revenue. This development has brought significant changes to the airline business, travel markets, and consumers. Today, airlines worldwide not only use e-commerce for online marketing and selling but also as a platform to offer unique services and capabilities that have no counterpart in the physical world. This book is an in-depth introduction to airline e-commerce. It covers a broad scope of areas that are essential to an airline’s ongoing digital transformation. Digital properties & features E-marketing E-sales & distribution Web customer service E-commerce organization E-commerce strategy Written by an airline e-commerce expert and illustrated with numerous examples of leading airlines in this area, Dr. Hanke provides for comprehensive "behind-the-scenes" details of how airline e-commerce works. This book is a crucial companion for students and practitioners alike because it allows the reader to acquire a thorough foundation of airline e-commerce. Furthermore, the book enables the reader to appreciate the ramifications of airline e-commerce in certain corporate areas and to take effective action for a successful e-commerce strategy.

Refine Search

Showing 18,801 through 18,825 of 54,022 results