Browse Results

Showing 53,676 through 53,700 of 54,064 results

Trade Options Online

by George A. Fontanills

In this fully updated book, options trading innovator George Fontanills arms you with the knowledge and skills youneed to unleash the phenomenal power of your computer to become a successful online options trader. Following a concise review of the basics of online trading--including hardware and software requirements and essential online resources--Fontanills cuts to the chase with step-by-step coverage of proven managed risk option trading strategies. Specifically designed for online traders, these tested off-floor techniques provide you with a sure-fire method for consistently building up your trading account. Drawing upon his years as a leading international options educator, Fontanills makes it easy for you to master online options trading by walking you through a series of hypothetical trades that demonstrate how to compute the maximum risk, maximum profit, breakevens, and exit alternatives for each strategy. Trade Options Online also includes a comprehensive guide to fundamental and technical analysis methodologies, a detailed list of the best financial resources, websites analyzed from the point of view of an online options trader, and a review of the most popular online brokerages. Trade Options Online is your complete guide to earning a living and making a killing as an online options trader.

Trading the Measured Move

by David M. Halsey

A timely guide to profiting in markets dominated by high frequency trading and other computer driven strategies Strategies employing complex computer algorithms, and often utilizing high frequency trading tactics, have placed individual traders at a significant disadvantage in today's financial markets. It's been estimated that high-frequency traders-one form of computerized trading-accounts for more than half of each day's total equity market trades. In this environment, individual traders need to learn new techniques that can help them navigate modern markets and avoid being whipsawed by larger, institutional players. Trading the Measured Move offers a blueprint for profiting from the price waves created by computer-driven algorithmic and high-frequency trading strategies. The core of author David Halsey's approach is a novel application of Fibonnaci retracements, which he uses to set price targets and low-risk entry points. When properly applied, it allows traders to gauge market sentiment, recognize institutional participation at specific support and resistance levels, and differentiate between short-term and long-term trades at various price points in the market. Provides guidance for individual traders who fear they can't compete in today's high-frequency dominated markets Outlines specific trade set ups, including opening gap strategies, breakouts and failed breakout strategies, range trading strategies, and pivot trading strategies Reveals how to escape institutional strategies designed to profit from slower-moving market participants Engaging and informative, Trading the Measured Move will provide you with a new perspective, and new strategies, to successfully navigate today's computer driven financial markets

Transformation of Collective Intelligences: Perspective of Transhumanism

by Jean-Max Noyer

There is a great transformation of the production of knowledge and intelligibility. The "digital fold of the world" (with the convergence of NBIC) affects the collective assemblages of "thought", of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern "performative science and performative society". But one emerges and strengthens that has several names: transhumanism, post-humanism, speculative post-humanism. It appears as a great narration, a large story about the future of our existence, facing our entry into the Anthropocene. It is also presented as a concrete utopia with an anthropological and technical change. In this book, we proposed to show how collective intelligences stand in the middle of the coupling of ontological horizons and of the "process of bio-technical maturation".

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors

by Perry Carpenter

Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

Transforming Business

by Jerry Power Allison Cerra Kevin Easterwood

A unique perspective of an evolved role for company leadershipBased on the findings of an extensive research project that surveyed more than 5,500 enterprise employees and functional decision makers across the United States and China, Transforming Business: Big Data, Mobility and Globalization explores the influence of technology in the workplace and the implications to company culture, functional responsibilities and competitive advantage. This in-depth analysis illuminates emerging technological trends, the changing workforce, and the shifting face of business and industry while offering prescriptive guidance to leaders.Addresses how new technology trends - including mobility, cloud, big data and collaboration - are fundamentally changing the way work is conducted and how company leadership can tap into these trends to affect positive cultural reformExamines how the introduction of new technologies and the emergence of new business models are shifting traditional organizational roles, including HR, marketing, finance, and ITTakes an in-depth look at how the next-generation of top talent, represented by college students at the top universities, view their future workplace environment and how technology can become a meaningful magnet for recruitment and retentionZeroes in on how the integration of technology into the workplace differs between the United States and China and the implications to the global marketplaceWhat emerges from this book is an evolved role for company leadership, one of significant strategic value as cultural stewards capable of generating sustainable advantage for their companies in the most competitive market witnessed in decades.

Transforming It Culture: How To Use Social Intelligence, Human Factors And Collaboration To Create An It Department That Outperforms

by Frank Wander

Practical, proven guidance for transforming the culture of any IT department As more and more jobs are outsourced, and the economy continues to struggle, people are looking for an alternative to the greed-driven, selfish leadership that has resulted in corporations where the workers are treated as interchangeable parts. This book shows how the human factors can be used to unlock higher returns on human capital such that workers are no longer interchangeable parts, but assets that are cared about and grown. Refreshingly innovative, Transforming IT Culture shows how neuroscientific and psychological research can be applied in the IT workplace to unleash a vast pool of untapped potential. Written by an expert on IT culture transformation Considers the widespread "cultural blindness" in business today, and how it can be addressed Draws on the author's repeated success transforming IT divisions across major corporations by applying the human factors Explains why social intelligence, human factors, and collaboration are the source of harmony, shared learning, mutual respect, and value creation Employees want positive change in business, something to stop the downward spiral we are on, both financially and emotionally. Transforming IT Culture shows how the essential ingredient to any high performing IT department is a culture where employees are valued and managed to their strengths. Using the Information Technology profession as a lens through which we can understand knowledge worker productivity and how to seriously improve it, this important new book reveals why Collaborative Social Systems are essential to every organization.

Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services

by Philippe Abdoulaye

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You’ll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization’s digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the “why” and, most importantly, the “how,” of digital transformation with Amazon Web Services.

Transitioning to Virtual and Hybrid Events: How to Create, Adapt, and Market an Engaging Online Experience

by Ben Chodor

Creating virtual events is not as simple as moving the same content online — learn how to immediately leverage virtual solutions for effective in-person online events As the global COVID-19 pandemic continues to have unprecedented impact on both the global economy and the whole of the world population, the need for effectively and efficiently connecting people and the right information has never been more urgent. Although the technology infrastructure currently exists, many organizations are scrambling to create virtual meetings and events to address important time-sensitive issues. Transitioning to Virtual and Hybrid Events explains everything an event host needs to know about going virtual, from understanding the new audience, to adapting content to the new medium, to marketing effectively, and much more. Author Ben Chodor, president of Intrado Digital Media, provides expert advice and real-world instructions for delivering engaging hybrid, virtual, and streaming events and webinars for companies of all sizes and across all industries. Packed with detailed tutorials, real-world case studies, illustrative examples, and highly useful checklists, this comprehensive resource provides step-by-step guidance on: Planning, creating, and implementing a digital event Choosing between a stream, a webcast, or a hybrid event Evaluating different technological solutions Producing compelling virtual content for a variety of scenarios Effectively promoting online events Meeting the needs of a diverse and global audience Transitioning to Virtual and Hybrid Events is an indispensable instruction manual for anyone tasked with enhancing their organization’s continuity plans, enabling their employee base to work remotely, or creating any type of virtual solution to meet this urgent crisis.

The Transverse Information System: New Solutions for IS and Business Performance

by Francois Rivard Georges Abou Harb Philippe Meret

Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apart from the competition. This comprehensive text provides the information needed to understand and implement these systems at a practical level.

Travel Photography In A Day For Dummies (In A Day For Dummies)

by Serge Timacheff

Take better travel shots on your next vacation with this terrific, 100-page e-book! From pro to hobbyist, from short weekends to dream vacations, every photographer wants to be able to capture memorable and compelling travel photos. Now you can hit the road with this fast-paced, In A Day For Dummies e-book that really zeros in on how to best capture eye-popping travel photos. Find out how to set your camera, make adjustments on the fly, prepare for all kinds of light--even get great shots with your smartphone. You'll go through this handy e-book in a day, and capture photos for a lifetime. Focuses on techniques for capturing fantastic travel photos, no matter where you are or what kind of camera Covers setting the camera for the shot, making adjustments on the fly, lighting and composition, using a smartphone camera, and editing and sharing your photos Includes a "Beyond the book" online component, where you can find step-by-step tutorials, videos, and a bonus lesson on creating a high-dynamic range travel photo Online extras also include a photo book, how to make money selling your photos, and a gallery of unique travel photos to inspire you Get Travel Photography In A Day For Dummies, grab your camera, and hit the road!

The Trend Following Bible

by Andrew Abraham David Druz

A proven approach to trading success based on the best commodity trading advisorsProfiting from long-term trends is the most common path to success for traders. The challenge is recognizing the emergence of a trend and determining where to enter and exit the market. The Trend Following Bible shows individual traders and investors how to profit from this approach by trading like today's top commodity trading advisors.In this book, author Andrew Abraham stresses the importance of a disciplined, consistent methodology, with stringent risk controls, that allows you to catch big trends, while limiting losses on unprofitable trades. By trading in this manner, he shows you how to successfully achieve market-beating returns over the long term and multiple your trading capital along the way.Reveals exactly how top commodity trading advisors operate and how individuals can incorporate these methods into their everyday trading endeavorsAddresses key issues like position sizing and risk control, which are critical to trading success, but often underemphasized in other trading literatureHighlights how to effectively execute the trading strategies outlinedEngaging and accessible, The Trend Following Bible will put you in a better position to profit as you make more informed trading decisions.

Trends in Constraint Programming

by Frédéric Benhamou Narendra Jussien Barry O'Sullivan

This title brings together the best papers on a range of topics raised at the annual International Conference on Principles and Practice of Constraint Programming. This conference provides papers and workshops which produce new insights, concepts and results which can then be used by those involved in this area to develop their own work.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world’s most noteworthy hackers and influential security specialists.

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

by Marcus J. Carey Jennifer Jin

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership (Tribe of Hackers)

by Marcus J. Carey Jennifer Jin

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

TRIVERGENCE: Accelerating Innovation with AI, Blockchain, and the Internet of Things

by Bob Tapscott

A Breakthrough Introduction to The Next Phase of the Digital Age In Trivergence, Bob Tapscott, writer, speaker, complex system designer, and former CIO introduces an exciting new concept in explaining how the intersection of artificial intelligence (AI), blockchain, and the Internet of Things (IoT) will transform business and society. He explains the synergies between these technologies and the disruptive potential that they will offer, as well as the challenges and risks to making it happen. He offers an insightful guide through the difficult decisions that businesses and society must make to thrive in a new era where decisions will be difficult, and uncertainties abound. You'll discover how and why AI's power is now exploding, its growth driven by smarter approaches to neural networks trained on a new hardware architecture that can derive its intelligence from ever more massive datasets. You'll also find: Discussions of the multiplicative and exponential power of trivergence on the core technologies discussed in the book Explorations of IoT's tendency to bring the physical world to life as it harnesses the capabilities of AI and the blockchain How trivergence morphs Big Data into something new he calls “Infinite Data”, where thinking machines consider trillions of data points to generate their own content, value, and perspectives without programmed code or human intervention A fresh and innovative guide, rich with case stories, on how the most critical technologies of this new phase in the digital age are combining to drive business transformation, Trivergence will become a critical handbook for forward-looking leaders, and anyone interested in the intersection of cutting-edge tech and business.

Troubleshooting and Maintaining Your PC All-in-One Desk Reference For Dummies

by Dan Gookin

Maintaining a PC is important, and troubleshooting a PC can be a challenge. Dan Gookin is great at explaining how to handle common PC problems, and he's provided a complete, plain-English manual in Troubleshooting & Maintaining Your PC All-in-One For Dummies.Liberally laced with Dan's famous humor and clear instructions, Troubleshooting & Maintaining Your PC All-in-One For Dummies is divided into six minibooks covering hardware, software, laptops, Internet, networking, and maintenance. Each one gives you some background on what causes common problems, to help you understand what's wrong as well as how to fix it. You'll learn to:Troubleshoot both Windows XP and VistaSolve e-mail and Web woes, makes friends with ActiveX, and protect your system from evil software and virusesResolve router problems, reset the modem, delve into IP addresses, and find the elusive wireless networkInvestigate startup issues, battery quirks, and power problemsTravel safely and efficiently with your laptopPerform regular maintenance and keep good backupsSolve problems with disks and printersFind missing files, successfully restore files if something major goes wrong, and pep up your PCThe bonus DVD walks you through some of the complex steps discussed in the book and demonstrates tasks like removing a hard drive. There's a great collection of free and demo software, too. Troubleshooting & Maintaining Your PC All-in-One For Dummies is tech support in a book!Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Troubleshooting and Maintaining Your PC All-in-One For Dummies

by Dan Gookin

Stop being a prisoner to your PC! Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you. There's nothing worse than firing up your PC only to discover it's inexplicably unresponsive. With this guide, you'll gain all the skills and insight you need to need to bring it back to life —and to prevent it from ever leaving you in the lurch again. Find out what's behind common PC problems Solve email and web woes, both big and small Perform regular maintenance and get serious about backups Troubleshoot to find solutions to your issues and learn proper maintenance to head off future headaches! Your PC problems aren't as big as you think! Take matters into your own hands with the helpful instruction provided inside this book!

Troubleshooting for Network Operators: The Road to a New Paradigm with Encrypted Traffic

by Van Van Tong Sami Souihi Hai-Anh Tran Abdelhamid Mellouk

Nowadays, the Internet is becoming more and more complex due to an everincreasing number of network devices, various multimedia services and a prevalence of encrypted traffic. Therefore, in this context, this book presents a novel efficient multi modular troubleshooting architecture to overcome limitations related to encrypted traffic and high time complexity. This architecture contains five main modules: data collection, anomaly detection, temporary remediation, root cause analysis and definitive remediation. In data collection, there are two sub modules: parameter measurement and traffic classification. This architecture is implemented and validated in a software-defined networking (SDN) environment.

Troubleshooting & Maintaining PCs All-in-One For Dummies

by Dan Gookin

Show your PC who’s boss Nothing’s more annoying than a tech malfunction, especially when it’s your PC—with the exception of perhaps wading through reams of random, unreliable theories online looking for a solution, or paying an expensive tech geek to show up to perform a five-minute fix. The latest edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies puts all this frustration behind you and gets you straight to work solving the problem yourself! In his straightforward, friendly style, Dan Gookin—bestselling tech author and all-round Mr. Fixit—packs everything you need to know into 5-books-in-1, giving you the knowledge and process to hit on the right solution, fast. From identifying common problems to methodically narrowing down to the correct fix, you’ll save hours of frustrating research—and experience the sweet, righteous satisfaction of having achieved it all yourself. Pick up quick fixes Understand and reconnect networks Restore memory Boost your PC’s performance Every problem has a solution and PCs are no different: get this book and you’ll never catch yourself shouting at your monitor or frustrated with the motherboard again—well, maybe not quite so often.

Troubleshooting & Maintaining Your PC All-in-One For Dummies, 2nd Edition

by Dan Gookin

Diagnose and solve your PC problems with this easy-to-understand guide Written by veteran For Dummies author Dan Gookin, this straightforward guide shows you how to diagnose and solve the most common hardware and software problems your PC may encounter. In addition, he presents advice for preventing PC problems in the first placeand clearly explains how to create a safe and secure PC environment. Walks you through ways to diagnose the most common PC hardware, software, and operating system problems Offers clear and easy-to-understand solutions for confidently handling these problems Shares valuable advice about maintaining your system to maximize its lifespan Reviews an array of useful tools Covers Windows Vista, Windows 7, and Internet Explorer 8 Troubleshooting & Maintaining Your PC All-in-One For Dummies, 2nd Edition helps you to confidently handle whatever PC problems you may encounter.

Trust in Computer Systems and the Cloud

by Mike Bursell

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI

by Beena Ammanath

An essential resource on artificial intelligence ethics for business leaders In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application Best practices, mechanisms, and governance considerations for embedding AI ethics in business processes and decision making Written to inform executives, managers, and other business leaders, Trustworthy AI breaks new ground as an essential resource for all organizations using AI.

Trustworthy Cloud Computing

by Vladimir O. Safonov

Introduces the topic of cloud computing with an emphasis on the trustworthiness of cloud computing systems and services This book describes the scientific basis of cloud computing, explaining the ideas, principles, and architectures of cloud computing as well the different types of clouds and the services they provide. The text reviews several cloud computing platforms, including Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo. The author addresses the problem of trustworthiness in cloud computing and provides methods to improve the security and privacy of cloud applications. The end-of-chapter exercises and supplementary material on the book's companion website will allow readers to grasp the introductory and advanced level concepts of cloud computing. Examines cloud computing platforms such as Microsoft Azure, Amazon, Oracle, Google, HP, IBM, Salesforce, and Kaavo Analyzes the use of aspect-oriented programming (AOP) for refactoring cloud services and improving the security and privacy of cloud applications Contains practical examples of cloud computing, test questions, and end-of-chapter exercises Includes presentations, examples of cloud projects and other teaching resources at the author's website (http://www.vladimirsafonov.org/cloud) Trustworthy Cloud Computing is written for advanced undergraduate and graduate students in computer science, data science, and computer engineering as well as software engineers, system architects, system managers, and software developers new to cloud computing.

Refine Search

Showing 53,676 through 53,700 of 54,064 results