Browse Results

Showing 35,126 through 35,150 of 61,674 results

Social Media Warfare: Equal Weapons for All

by Michael Erbschloe

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

by Michael Erbschloe

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Walling Out the Insiders: Controlling Access to Improve Organizational Security

by Michael Erbschloe

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.

CoffeeScript Programming with jQuery, Rails, and Node.js

by Michael Erasmus

It's a quick guide for programming CoffeeScript and then diving into programming with Rails, jQuery, and Node.js. This book is for web developers who would like to learn programming with CoffeScript. It is also for developers who have some experience in JavaScript and are curious to learn CoffeScript and build applications with it.

Verification, Model Checking, and Abstract Interpretation: 24th International Conference, VMCAI 2023, Boston, MA, USA, January 16–17, 2023, Proceedings (Lecture Notes in Computer Science #13881)

by Jingbo Wang Cezara Dragoi Michael Emmi

This book constitutes the proceedings of the 24th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2023, which took place in Boston, USA, in January 2023. The 17 full papers presented in this book were carefully reviewed and selected from 34 submissions. The contributions deal with program verification, model checking, abstract interpretation, program synthesis, static analysis, type systems, deductive methods, decision procedures, theorem proving, program certification, debugging techniques, program transformation, optimization, and hybrid and cyber-physical systems.

Evolutionary Multi-Criterion Optimization: 12th International Conference, EMO 2023, Leiden, The Netherlands, March 20–24, 2023, Proceedings (Lecture Notes in Computer Science #13970)

by Michael Emmerich Boris Naujoks Hao Wang André Deutz Kaisa Miettinen Ke Li Anna V. Kononova Iryna Yevseyeva

This book constitutes the refereed proceedings of the 12th International Conference on Evolutionary Multi-Criterion Optimization, EMO 2022 held in Leiden, The Netherlands, during March 20-24, 2023. The 44 regular papers presented in this book were carefully reviewed and selected from 65 submissions. The papers are divided into the following topical sections: Algorithm Design and Engineering; Machine Learning and Multi-criterion Optimization; Benchmarking and Performance Assessment; Indicator Design and Complexity Analysis; Applications in Real World Domains; and Multi-Criteria Decision Making and Interactive Algorithms..

Hybrid Cloud Apps with OpenShift and Kubernetes

by Michael Elder Jake Kitchener Dr Brad Topol

Selling your CTO on the merits of OpenShift and Kubernetes is only the beginning. To operate and scale OpenShift, you also need to know how to manage and expose resources to application teams and continuously deliver changes to the applications running in these environments. With this practical book, new and experienced developers and operators will learn specific techniques for operationalizing OpenShift and Kubernetes in the enterprise.Industry experts Michael Elder, Jake Kitchener, and Brad Topol show you how to run OpenShift and Kubernetes in production and deliver your applications to a highly available, secure, and scalable platform. You'll learn how to build a strong foundation in advanced cluster operational topics, such as tenancy management, scheduling and capacity management, cost management, continuous delivery, and more.Examine the fundamental concepts of Kubernetes architectureGet different Kubernetes and OpenShift environments up and runningDive into advanced resource management topics, including capacity planningLearn how to support high availability inside a single clusterUse production-level approaches for continuous delivery and code promotion across clustersExplore hybrid cloud use cases, including multicluster provisioning, upgrading, and policy supportDevise and deliver disaster recovery strategies

Mobile App Development: For Ios And Android Edition 3. 0

by Jakob Iversen Michael Eierman

Mobile App Development: For IOS and Android Edition 3. 0

Guide to Network Security

by Michael E. Whitman Herbert J. Mattord David Mackey Andrew Green

The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals.

Management Of Information Security (Fourth Edition)

by Michael E. Whitman Herbert J. Mattord

MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics. The Fourth Edition is revised and updated to reflect changes in the field, including the ISO 27000 series, so as to prepare readers to succeed in the workplace.

Management of Information Security

by Michael E. Whitman Herbert J. Mattord

Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. <p><p>Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. <p><p>This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance.

Management of Information Security

by Michael E. Whitman Herbert J. Mattord

MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.

Principles of Information Security

by Michael E. Whitman Herbert J. Mattord

Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.

Principles of Information Security (MindTap Course List Series)

by Michael E. Whitman Herbert J. Mattord

Principles of Information Security, Sixth Edition, provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate an understanding of the topic as a whole. The book covers the terminology of the field, the history of the discipline, and strategies for managing an information security program. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.

Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation (Information Science and Statistics)

by Michael E. Schuckers

Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of bioauthentication devices, supplying a set of rigorous statistical methods for evaluating biometric authentication systems. This framework of methods can be extended and generalized for a wide range of applications and tests. This is the first single resource on statistical methods for estimation and comparison of the performance of biometric authentication systems. The book focuses on six common performance metrics: for each metric, statistical methods are derived for a single system that incorporates confidence intervals, hypothesis tests, sample size calculations, power calculations and prediction intervals. These methods are also extended to allow for the statistical comparison and evaluation of multiple systems for both independent and paired data. Topics and features: * Provides a statistical methodology for the most common biometric performance metrics: failure to enroll (FTE), failure to acquire (FTA), false non-match rate (FNMR), false match rate (FMR), and receiver operating characteristic (ROC) curves * Presents methods for the comparison of two or more biometric performance metrics * Introduces a new bootstrap methodology for FMR and ROC curve estimation * Supplies more than 120 examples, using publicly available biometric data where possible * Discusses the addition of prediction intervals to the bioauthentication statistical toolset * Describes sample-size and power calculations for FTE, FTA, FNMR and FMR Researchers, managers and decisions makers needing to compare biometric systems across a variety of metrics will find within this reference an invaluable set of statistical tools. Written for an upper-level undergraduate or master's level audience with a quantitative background, readers are also expected to have an understanding of the topics in a typical undergraduate statistics course. Dr. Michael E. Schuckers is Associate Professor of Statistics at St. Lawrence University, Canton, NY, and a member of the Center for Identification Technology Research.

Color in Electronic Display Systems

by Michael E. Miller

This book explores the principles, design, and image processing of multi-primary displays, and introduces the reader to the intricacies of the typical imaging pathways which influence display design and the perception of color within a display system. Early chapters introduce the concepts behind human perception, color science, and lighting, which are necessary to fully understand multi-primary displays. The reader is also introduced to digital capture and transmission systems to better understand the ecosystem in which multi-primary displays exist. Subsequent chapters introduce the reader to current display technologies, including LCD, OLED, and inorganic LED displays. The working principles, performance, and upcoming advances are discussed for each of these technologies to provide the reader with a clear understanding of the tradeoffs which are necessary when considering multi-primary displays. This discussion is followed by an in-depth discussion of the image processing technology necessary to implement multi-primary displays. The book concludes with chapters that clearly discuss the advantages and limitations of multi-primary displays for direct view, virtual reality, and augmented reality displays. The book provides a broad viewpoint across the entire display ecosystem, explaining the interactions among system components to provide a rationale for the further development of multi-primary displays. Whether the reader is interested in broadening their understanding of display systems or the development of multi-primary displays, the text provides and understandable and practical summary of important display system concepts.

Integrating Artificial and Human Intelligence through Agent Oriented Systems Design (Systems Innovation Book Series)

by Michael E. Miller Christina F. Rusnock

This book departs from the assumption that Artificial Intelligence (AI) systems will provide a maximum advantage by replacing human cognitive processing. Instead, this book subscribes to the assumption that AI systems will provide a maximal advantage when the system is specifically designed to augment human intelligence. It provides methods for designing effective systems that include one or more humans and one or more AI entities and uses the approach that assumes automation does not replace human activity but fundamentally changes the structure of human work when AI is added to existing systems.Integrating Artificial and Human Intelligence through Agent Oriented Systems Design discusses the potential impact of AI on human work and life and explores why teamwork is necessary today for complex work environments. The book explains the processes and methods humans employ to effectively team with one another and presents the elements of artificial agents that permit them to function as team members in joint human and artificial teams. It discusses design goals and illustrates how the methods that have been used to model the complex interactions among human and artificial agents can be expanded to enable the design of interaction between them to make possible the attainment of the shared goals. Model-Based Systems Engineering (MBSE) tools that provide logical designs of human–agent teams, the AI within these teams, training to be deployed for human and artificial agent team members, and the interfaces between human and artificial agent team members are all covered. MBSE files containing profiles and examples for building MBSE models used in the design approach are featured on the author’s website (https://lodesterresci.com/hat).This book is an ideal read for students, professors, engineers, and project managers associated with designing and developing AI systems or systems that seek to incorporate AI.

Setting the PACE in Product Development

by Michael E. McGrath

Setting the PACE in Product Development describes how to effectively manage the key ingredients of successful product development: time, quality, talent and resources. This revised edition of Product Development provides essential insight as to how to efficiently organize people, resources and processes to dramatically improve financial results, strategic positions, internal morale and customer satisfaction. The PACE techniques integrate vital company-wide functions, engaging the entire company and focusing its collective energy on strategically and financially important goals.

Similarity Search and Applications

by Laurent Amsaleg Michael E. Houle Erich Schubert

This book constitutes the proceedings of the 9th International Conference on Similarity Search and Applications, SISAP 2016, held in Tokyo, Japan, in October 2016. The 18 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The program of the conference was grouped in 8 categories as follows: graphs and networks; metric and permutation-based indexing; multimedia; text and document similarity; comparisons and benchmarks; hashing techniques; time-evolving data; and scalable similarity search.

Twitter for Dummies, Pocket Edition

by Laura Fitton Michael E. Gruen Leslie Poston

A fully updated guide to the how and why of using Twitter. The fastest-growing social network utility sports new features, and they're all covered in this how-to guide. This book shows you how to join them and why you should.

The E-Myth Revisited: Why Most Small Businesses Don't Work and What to Do About It

by Michael E. Gerber

Author provides information on building and running a successful business.

Apple Interface Mysteries

by Michael E. Cohen

Apple devices are supposed to be easy to use, and they generally are—at least for basic things. But over the years, as features have multiplied exponentially and hardware has changed dramatically, the user interfaces of Macs, iPhones, and iPads (among other Apple products) have become increasingly inscrutable. This book explores the mysteries of how and why things are the way they are now—and shows you how you can solve your own Apple usability puzzles.

Take Control of PDFpen

by Michael E. Cohen

Polish your PDFs with Smile's PDFpen, for a fraction of what Adobe Acrobat costs! Michael E. Cohen explains how you can create, combine, edit, annotate, and protect PDFs. Also learn how to perform and edit OCR, fill out forms, sign forms digitally, make interactive forms, and much more. Covers Mac and iOS versions!

Take Control of PDFpen

by Michael E. Cohen

Polish your PDFs with Smile's PDFpen, for a fraction of what Adobe Acrobat costs! Michael E. Cohen explains how you can create, combine, edit, annotate, and protect PDFs. Also learn how to perform and edit OCR, fill out forms, sign forms digitally, make interactive forms, and much more. Covers Mac and iOS versions!

Take Control of PDFpen

by Michael E. Cohen

Polish your PDFs with Smile's PDFpen, for a fraction of what Adobe Acrobat costs! Michael E. Cohen explains how you can create, combine, edit, annotate, and protect PDFs. Also learn how to perform and edit OCR, fill out forms, sign forms digitally, make interactive forms, and much more. Covers Mac and iOS/iPadOS versions!

Refine Search

Showing 35,126 through 35,150 of 61,674 results