Browse Results

Showing 38,801 through 38,825 of 61,674 results

ICT Education: 45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers (Communications in Computer and Information Science #642)

by Stefan Gruner Salah Kabanda Hussein Suleman

45th Annual Conference Of The Southern African Computer Lecturers' Association, Sacla 2016, Cullinan, South Africa, July 5-6, 2016, Revised Selected Papers

ICT Systems Security and Privacy Protection

by Stefan Katzenbeisser Jaap-Henk Hoepman

This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic protocols, human aspects of security, cyber infrastructure, social networks, software vulnerabilities, TPM and internet of things, sidechannel analysis, software security, and privacy.

ICT for Promoting Human Development and Protecting the Environment

by Francisco J. Mata Ana Pont

This book constitutes the refereed proceedings of the 6th IFIP World Information Technology Forum, WITFOR 2016, San Jos#65533;, Costa Rica, in September 2016. The 16 full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. Within the general theme ICT for Promoting Human Development and Protecting the Environment the papers are organized in the following topical sections encompassing the Sustainable Development Goals (SDGs) recently adopted by the United Nations: ICT and cross-cutting development issues; ICT and environmental problems: ICT and human development problems; and ICT and economic development problems.

ICT in Education

by Maria José Marcelino Antonió José Mendes Maria Cristina Azevedo Gomes

This book presents a peer reviewed selection of extended versions of ten original papers that were presented at the 15th International Symposium on Computers in Education (SIIE 2013) held in Viseu, Portugal. The book provide a representative view of current Information and Communications Technology (ICT) educational research approaches in the Ibero-American context as well as internationally. It includes studies that range from elementary to higher education, from traditional to distance learning settings. It considers special needs and other inclusive issues, across a range of disciplines, using multiple and diverse perspectives and technologies to furnish detailed information on the latest trends in ICT and education globally. Design, development and evaluation of educational software; ICT use and evaluation methodologies; social web and collaborative systems; and learning communities are some of the topics covered.

ICT in Education in Global Context

by Kinshuk Ronghuai Huang Jon K. Price

This book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.

ICT in Education in Global Context

by Maiga Chang Jinbao Zhang Junfeng Yang Tingwen Chang

Intended to promote the innovative use of technology in education and promote educational advances all over the world, this volume brings together 16 best-practice cases on technology-enhanced educational innovations. Experts from Turkey, Tunisia, Cyprus, Italy, Malaysia, China, India and Finland have contributed to these cases, highlighting the current state-of-the-art in the use of technology in education in their respective counties. Topics include best practices for designing smart classrooms, effective use of tablets and interactive whiteboards, virtual learning environments, digital learning spaces, game-based learning, synchronous cyber classrooms, micro-courses, among others. The book offers an essential resource on emerging technologies and the educational approaches currently being pursued in different countries to foster effective learning.

ICT in Education in Global Context

by Kinshuk Ronghuai Huang Jon K. Price

This book aims to capture the current innovation and emerging trends of digital technologies for learning and education in k-12 sector through a number of invited chapters in key research areas. Emerging Patterns of innovative instruction in different context, Learning design for digital natives, Digital learning resources for personalized learning in both formal and informal educational settings, e-leadership and teacher's digital capacity will be covered in the book. This book intends to provide reference for the innovation in K-12 schools. Researchers, policy makers, school administrators and also teachers could benefit from this book on researchers and methods for innovation in K-12 schools all over the world.

ICTs in Developing Countries: Research, Practices and Policy Implications

by Bidit Dey Karim Sorour Raffaele Filieri

ICTs in Developing Countries is a collection of conceptual and empirical works on the adoption and impacts of ICT use in developing societies. Bringing together a wide range of disciplines and contributors, it offers a rich examination of digital divide and ICT for development both in terms of contextual information and disciplinary perspectives.

IT Disaster Response

by Greg D. Moore

Learn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning.IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.This book examines disasters in general—a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise.The book contains practical guidance on:How to think about a disaster both before it happens and while it’s happeningHow to apply management skills used in other fields during disastersHow to get everyone on board when it comes to planning for and handling disastersHow to better deal with smaller, more manageable—and more frequently occurring—disastersWhat you’ll learn Discover the difference between a DR solution and a DR planDefine a disaster — it’s not always of the scale of a fire burning down the building.See when to actually implement your DR plan Who This Book Is ForIT professionals in charge of developing their company’s disaster recovery plan who also need to raise issues to the required C-level people to make sure they have a viable plan.

IT Security Risk Control Management

by Raymond Pompon

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Management provides step-by-step guidance for IT professionals on how to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes. What You Will Learn: Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threats Prepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001 Calibrate the scope, and customize security controls to fit into an organization's culture Implement the most challenging processes, pointing out common pitfalls and distractions Frame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice Who This Book Is For: IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e. g. , former military security professionals, law enforcement professionals, and physical security professionals)

IT-Controlling für Einsteiger: Praxiserprobte Methoden und Werkzeuge (essentials)

by Andreas Gadatsch

Andreas Gadatsch beschreibt, was IT-Controlling konkret ist und wie man es nutzen kann. Hierzu erklärt der Autor die zentralen Aspekte und stellt praxistaugliche Methoden anhand von Beispielen vor. Erleichtern Sie sich die tägliche Praxis im IT-Management! Nach der Lektüre dieses essentials können Sie u. a. mit Hilfe der IT-Balanced Scorecard IT-Strategien umsetzen und steuern oder mit Hilfe des Portfoliomanagements Projektbündel zusammenstellen und überwachen. Die Earned-Value-Analyse hilft Ihnen bei der Projektplanung und deren Überwachung. Mit Hilfe der IT-Kosten- und Leistungsrechnung und IT-Kennzahlen liefern Sie die Basis für rationale Entscheidungen und ein zielorientiertes Reporting. Wer mehr wissen möchte, findet hier auch geeignete Hinweise auf weitere Literatur und aktuelle Studien.

ITIL Intermediate Certification Companion Study Guide: Intermediate ITIL Service Lifecycle Exams

by Helen Morris Liz Gallacher

Complete, detailed preparation for the Intermediate ITIL Service Lifecycle examsITIL Intermediate Certification Companion Study Guide is the ultimate supporting guide to the ITIL Service Lifecycle syllabus, with full coverage of all Intermediate ITIL Service Lifecycle exam objectives for Service Operation, Service Design, Service Transition, Continual Service Improvement, and Service Strategy. Using clear and concise language, this useful companion guides you through each Lifecycle module and each of the process areas, helping you understand the concepts that underlie each skill required for certification. Illustrative examples demonstrate how these skills are applied in real-life scenarios, helping you realize the importance of what you're learning each step of the way. Additional coverage includes service strategy principles and processes, governance, organization, implementation, and technology considerations, plus guidance toward common challenges and risks. ITIL is the most widely adopted approach for IT Service Management in the world, providing a practical, no-nonsense framework for identifying, planning, delivering, and supporting IT services to businesses. This study guide is the ultimate companion for certification candidates, giving you everything you need to know in a single informative volume. Review the information needed for all five Lifecycle exams Examine real-life examples of how these concepts are applied Gain a deeper understanding of each of the process areas Learn more about governance, organization, implementation, and more The Intermediate ITIL Service Lifecycle exams expect you to demonstrate thorough knowledge of the concepts, processes, and functions related to the modules. The certification is recognized around the world as the de facto standard for IT Service Management, and the skills it requires increase your value to any business. For complete, detailed exam preparation, ITIL Certification Companion Study Guide for the Intermediate ITIL Service Lifecycle Exams is an invaluably effective tool.

Identity and Data Security for Web Development: Best Practices

by Tim Messerschmidt Jonathan LeBlanc

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity—without compromising usability. You’ll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security todayDesign security password encryption, and combat password attack vectorsCreate digital fingerprints to identify users through browser, device, and paired device detectionBuild secure data transmission systems through OAuth and OpenID ConnectUse alternate methods of identification for a second factor of authenticationHarden your web applications against attackCreate a secure data transmission system using SSL/TLS, and synchronous and asynchronous cryptography

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone

by Steve Martinelli Brad Topol Henry Nash

Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features—support for federated identity

Image Analysis and Recognition

by Aurélio Campilho Fakhri Karray

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016. The 79 revised full papers and 10 short papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in the following topical sections: Advances in Data Analytics and Pattern Recognition with Applications, Image Enhancement and Restoration, Image Quality Assessment, Image Segmentation, Pattern Analysis and Recognition, Feature Extraction, Detection and Recognition, Matching, Motion and Tracking, 3D Computer Vision, RGB-D Camera Applications, Visual Perception in Robotics, Biometrics, Biomedical Imaging, Brain Imaging, Cardiovascular Image Analysis, Image Analysis in Ophthalmology, Document Analysis, Applications, and Obituaries. "

Image Feature Detectors and Descriptors

by Ali Ismail Awad Mahmoud Hassaballah

This bookprovides readers with a selection of high-quality chapters that cover boththeoretical concepts and practical applications of image feature detectors anddescriptors. It serves as reference for researchers and practitioners byfeaturing survey chapters and research contributions on image feature detectorsand descriptors. Additionally, it emphasizes several keywords in boththeoretical and practical aspects of image feature extraction. The keywordsinclude acceleration of feature detection and extraction, hardwareimplantations, image segmentation, evolutionary algorithm, ordinal measures, aswell as visual speech recognition.

Image Processing and Communications Challenges 7

by Ryszard S. Choraś

This book contains papers accepted for IP&C 2015, the International Conference on Image Processing and Communications, held at UTP University of Science and Technology, Bydgoszcz, Poland, September 9-11, 2015. This conference was the eighth edition in the IP&C series of annual conferences. This book and the conference have the aim to bring together researchers and scientists in the broad fields of image processing and communications, addressing recent advances in theory, methodology and applications. The book will be of interest to a large group of researchers, engineers and practitioners in image processing and communications.

Image Processing in Diabetic Related Causes

by Amit Kumar Fahimuddin Shaik

This book is a collection of all the experimental results and analysis carried out on medical images of diabetic related causes. The experimental investigations have been carried out on images starting from very basic image processing techniques such as image enhancement to sophisticated image segmentation methods. This book is intended to create an awareness on diabetes and its related causes and image processing methods used to detect and forecast in a very simple way. This book is useful to researchers, Engineers, Medical Doctors and Bioinformatics researchers.

Image and Signal Processing

by Alamin Mansouri Fathallah Nouboud Alain Chalifour Driss Mammass Jean Meunier Abderrahim Elmoataz

This book constitutes the refereed proceedings of the 7th International Conference, ICISP 2016, held in May/June 2016 in Trois-Rivières, QC, Canada. The 40 revised full papers were carefully reviewed and selected from 83 submissions. The contributions are organized in topical sections on features extraction, computer vision, and pattern recognition; multispectral and color imaging; image filtering, segmentation, and super-resolution; signal processing; biomedical imaging; geoscience and remote sensing; watermarking, authentication and coding; and 3d acquisition, processing, and applications.

Image and Video Technology

by Mariano Rivera Thomas Bräunl Brendan Mccane Xinguo Yu

Thisbook constitutes the thoroughly refereed post-conference proceedings of the 7thPacific Rim Symposium on Image and Video Technology, PSIVT 2015, held in Auckland,New Zealand, in November 2015. Thetotal of 61 revised papers was carefully reviewed and selected from 133submissions. The papers are organized in topical sections on color and motion,image/video coding and transmission, computational photography and arts, computervision and applications, image segmentation and classification, videosurveillance, biomedical image processing and analysis, object and patternrecognition, computer vision and pattern recognition, image/video processingand analysis, and pattern recognition.

Image and Video Technology - PSIVT 2015 Workshops

by Fay Huang Akihiro Sugimoto

This book constitutes the thoroughly refereedpost-conference proceedings of six international workshops held in theframework of the 7th Pacific-Rim Symposium on Image and Video Technology, PSIVT2015, during November 23-24, 2015, in Auckland, New Zealand. The 29 revised full papers presented werecarefully selected from 58 submissions. Their topics diversely ranged fromwell-established areas to novel current trends: robot vision, RV 2015; 2D and3D geometric properties from incomplete data, GPID 2015; vision meets graphics,VG 2015; passive and active electro-optical sensors for aerial and spaceimaging, EO4AS 2015; mathematical and computational methods in biomedicalimaging and image analysis, MCBMIIA 2015; and video surveillance, VSWS 2015.

Immersive Learning Research Network

by Colin Allison Leonel Morgado Johanna Pirker Dennis Beck Jonathon Richter Christian Gütl

This book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.

Immersive Learning Research Network: Third International Conference, iLRN 2017, Coimbra, Portugal, June 26–29, 2017. Proceedings (Communications in Computer and Information Science #725)

by Colin Allison Leonel Morgado Johanna Pirker Dennis Beck Jonathon Richter Christian Gütl Foaad Khosmood

This book constitutes the refereed proceedings of the Second International Conference of the Immersive Learning Network, iLRN 2016, held in Santa Barbara, CA, USA, in June/July 2016. The proceedings contain 9 full papers carefully reviewed and selected from 45 submissions and the best 5 special track papers. The papers focus on various applications of immersive technologies to learning.

Implementando el método GTD con Evernote

by Jonathan Baker Maria Jose Balbontin

Aprende cómo sacarle el máximo provecho al método GTD y a Evernote. Getting Things Done®, o GTD®, es un método de gestión de tiempo creado por el consultor de productividad David Allen. GTD es una de las técnicas más efectivas y populares que puedes usar para tomar las riendas de tu lista de tareas e incrementar tu productividad. El método GTD no sólo te ayuda a completar las tareas y proyectos inmediatos, sino que también te ayuda a avanzar hacia las metas más grandes en tu vida. Evernote® es un programa que originalmente fue creado para tomar y archivar notas. Estas notas pueden ser de texto, páginas web, mensajes de voz, fotos, y más. Evernote es estupendo para guardar todo tipo de información, y te hace fácil organizar y encontrar tu información. Con los consejos que ofrece este libro podrás combinar Evernote y GTD para crear un poderoso sistema para mejorar tu productividad. Usar el método GTD con Evernote te permitirá organizar tu vida personal y profesional en formato electrónico. Ya que Evernote está disponible como aplicación web y en dispositivos móviles, siempre puedes tener acceso a tus tareas, proyectos, metas y notas cuando y donde las necesites.

Implementation and Application of Automata

by Yo-Sub Han Kai Salomaa

This book constitutes the refereed proceedings of the 21st InternationalConference on Implementation and Application of Automata, CIAA 2016, held in Seoul, South Korea, in July 2016. The 26 revised full papers presented were carefully reviewed and selected from49 submissions. The papers cover a wide range of topics including characterizations of automata, computing distances between strings and languages, implementations ofautomata and experiments, enhanced regular expressions, and complexity analysis.

Refine Search

Showing 38,801 through 38,825 of 61,674 results