Browse Results

Showing 52,851 through 52,875 of 53,966 results

Remapping Cold War Media: Institutions, Infrastructures, Translations

by Alice Lovejoy and Mari Pajala

Why were Hollywood producers eager to film on the other side of the Iron Curtain? How did Western computer games become popular in socialist Czechoslovakia's youth paramilitary clubs? What did Finnish commercial television hope to gain from broadcasting Soviet drama?Cold War media cultures are typically remembered in terms of an East-West binary, emphasizing conflict and propaganda. Remapping Cold War Media, however, offers a different perspective on the period, illuminating the extensive connections between media industries and cultures in Europe's Cold War East and their counterparts in the West and Global South. These connections were forged by pragmatic, technological, economic, political, and aesthetic forces; they had multiple, at times conflicting, functions and meanings. And they helped shape the ways in which media circulates today—from film festivals, to satellite networks, to coproductions.Considering film, literature, radio, photography, computer games, and television, Remapping Cold War Media offers a transnational history of postwar media that spans Eastern and Western Europe, the Nordic countries, Cuba, the United States, and beyond. Contributors draw on extensive archival research to reveal how media traveled across geopolitical boundaries; the processes of translation, interpretation, and reception on which these travels depended; and the significance of media form, content, industries, and infrastructures then and now.

Ansible Quick Start Guide: Control and monitor infrastructures of any size, physical or virtual

by Mohamed Alibi

Configure Ansible and start coding YAML playbooks using the appropriate modulesKey FeaturesCreate and use Ansible Playbook to script and organise management tasksBenefit from the Ansible community roles and modules to resolve complex and niche tasksWrite configuration management code to automate infrastructureBook DescriptionConfiguration Management (CM) tools help administrators reduce their workload. Ansible is one of the best Configuration Management tools, and can act as an orchestrator for managing other CMs. This book is the easiest way to learn how to use Ansible as an orchestrator and a Configuration Management tool. With this book, you will learn how to control and monitor computer and network infrastructures of any size,physical or virtual. You will begin by learning about the Ansible client-server architecture. To get started, you will set up and configure an Ansible server. You will then go through the major features of Ansible: Playbook and Inventory. Then, we will look at Ansible systems and network modules. You will then use Ansible to enable infrastructure automated configuration management, followed by best practices for using Ansible roles and community modules. Finally, you will explore Ansible features such as Ansible Vault, Ansible Containers, and Ansible plugins.What you will learnImplement Playbook YAML scripts and its capacities to simplify day-to-day tasksSetup Static and Dynamic InventoryUse Ansible predefined modules for Linux, Windows, networking, and virtualisation administrationOrganize and configure the host filesystem using storage and files modulesImplement Ansible to enable infrastructure automated configuration managementSimplify infrastructure administrationSearch and install new roles and enable them within AnsibleSecure your data using Ansible VaultWho this book is forThis book is targeted at System Administrators and Network Administrators who want to use Ansible to automate an infrastructure. No knowledge of Ansible is required.

ICT Development for Social and Rural Connectedness

by Nor Aziah Alias

ICT Development for Social and Rural Connectedness provides an introduction to the concept of 'connectedness', and explores how this socio-psychological term has evolved during the age of the Internet. The book surveys the principles of ICT for development (ICTD), and closely examines how ICT has played a pivotal role in the rural community development of various countries. To highlight the continued benefits of ICT in these regions, the book presents an in-depth case study that analyzes the connectedness within the rural internet centers of Malaysia. The book is intended primarily for researchers and practitioners as a reference guide to ICTD in rural environments.

Next Generation and Advanced Network Reliability Analysis: Using Markov Models and Software Reliability Engineering (Signals and Communication Technology)

by Syed Riffat Ali

This book covers reliability assessment and prediction of new technologies such as next generation networks that use cloud computing, Network Function Virtualization (NVF), Software Defined Network (SDN), Next Generation Transport, Evolving Wireless Systems, Digital VoIP Telephony, and Reliability Testing techniques specific to Next Generation Networks (NGN). This book introduces the technology to the reader first, followed by advanced reliability techniques applicable to both hardware and software reliability analysis. The book covers methodologies that can predict reliability using component failure rates to system level downtimes. The book’s goal is to familiarize the reader with analytical techniques, tools and methods necessary for analyzing very complex networks using very different technologies. The book lets readers quickly learn technologies behind currently evolving NGN and apply advanced Markov modeling and Software Reliability Engineering (SRE) techniques for assessing their operational reliability.Covers reliability analysis of advanced networks and provides basic mathematical tools and analysis techniques and methodology for reliability and quality assessment;Develops Markov and Software Engineering Models to predict reliability;Covers both hardware and software reliability for next generation technologies.

Practical Linux Infrastructure

by Syed Ali

Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions. Using this book, you'll understand why scale matters, and what considerations you need to make. You'll see how to switch to using Google Cloud Platform for your hosted solution, how to use KVM for your virtualization, how to use Git, Postfix, and MySQL for your version control, email, and database, and how to use Puppet for your configuration management. For enterprise-level fault tolerance you'll use Apache, and for load balancing and high availability, you'll use HAProxy and Keepalived. For trend analysis you'll learn how to use Cacti, and for notification you'll use Nagios. You'll also learn how to utilize BIND to implement DNS, how to use DHCP (Dynamic Host Configuration Protocol), and how to setup remote access for your infrastructure using VPN and Iptables. You will finish by looking at the various tools you will need to troubleshoot issues that may occur with your hosted infrastructure. This includes how to use CPU, network, disk and memory management tools such as top, netstat, iostat and vmstat. Author Syed Ali is a senior site reliability engineering manager, who has extensive experience with virtualization and Linux cloud based infrastructure. His previous experience as an entrepreneur in infrastructure computing offers him deep insight into how a business can leverage the power of Linux to their advantage. He brings his expert knowledge to this book to teach others how to perfect their Linux environments. Become a Linux infrastructure pro with Practical Linux Infrastructure today.

Cancer Prevention Through Early Detection: First International Workshop, CaPTion 2022, Held in Conjunction with MICCAI 2022, Singapore, September 22, 2022, Proceedings (Lecture Notes in Computer Science #13581)

by Sharib Ali Fons van der Sommen Bartłomiej Władysław Papież Maureen Van Eijnatten Yueming Jin Iris Kolenbrander

This book constitutes the refereed proceedings of the first International Workshop on Cancer Prevention through Early Detection, CaPTion, held in conjunction with the 25th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2022, in Singapore, Singapore, in September 2022. The 16 papers presented at CaPTion 2022 were carefully reviewed and selected from 21 submissions. The workshop invites researchers to submit their work in the field of medical imaging around the central theme of early cancer detection, and it strives to address the challenges that are required to be overcomed to translate computational methods to clinical practice through well designed, generalizable (robust), interpretable and clinically transferable methods.

Cancer Prevention Through Early Detection: Second International Workshop, CaPTion 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 12, 2023, Proceedings (Lecture Notes in Computer Science #14295)

by Sharib Ali Fons van der Sommen Maureen Van Eijnatten Bartłomiej W. Papież Yueming Jin Iris Kolenbrander

This book constitutes the refereed proceedings of the second International Workshop on Cancer Prevention through Early Detection, CaPTion, held in conjunction with the 26th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2023, in Vancouver, Canada, in October 2023.The 11 papers presented at CaPTion 2023 were carefully reviewed and selected from 12 submissions. The workshop invites researchers to submit their work in the field of medical image analysis around the central theme of cancer and early cancer detection, progression, inflammation understanding, multimodality data, and computer-aided navigation.

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

by Shakeel Ali Tedi Heriyanto Lee Allen Gerard Johansen

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! About This Book * Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before * Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town--Kali Linux 2 (aka Sana). * Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Who This Book Is For If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you. What You Will Learn * Find out to download and install your own copy of Kali Linux * Properly scope and conduct the initial stages of a penetration test * Conduct reconnaissance and enumeration of target networks * Exploit and gain a foothold on a target system or network * Obtain and crack passwords * Use the Kali Linux NetHunter install to conduct wireless penetration testing * Create proper penetration testing reports In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement. Kali Linux - Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age. Style and approach This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.

BackTrack 4: Assuring Security by Penetration Testing

by Shakeel Ali Tedi Heriyanto

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.

Kali Linux – Assuring Security by Penetration Testing

by Shakeel Ali Lee Allen Tedi Heriyanto

Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually. If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

I'm Rich, You're Poor: How to Give Social Media a Reality Check

by Shabaz Ali

The world is full of books about how to be rich. This is not one of them.Today, many of us are feeling the pinch - and being bombarded with portrayals of social media 'perfection' is making that pinch feel more like a punch.We may know that social media - with all its billionaires and beauty queens - is just a highlight reel. So why is it still making most of us feel so low?Comedian Shabaz Ali wants to help you see the funny side of social media again. Because while it looks nice to live up in an ivory tower, this book reminds us that it is much more fun to be part of the baying mob that surrounds it.This laugh-out-loud deep-dive into social media's ridiculously rich, will help you love your own penny-pinched, rough-around-the-edges, extraordinarily ordinary life.

Applications of Soft Computing for the Web

by Rashid Ali Mm Sufyan Beg

This book discusses the applications of different soft computing techniques for the web-based systems and services. The respective chapters highlight recent developments in the field of soft computing applications, from web-based information retrieval to online marketing and online healthcare. In each chapter author endeavor to explain the basic ideas behind the proposed applications in an accessible format for readers who may not possess a background in these fields. This carefully edited book covers a wide range of new applications of soft computing techniques in Web recommender systems, Online documents classification, Online documents summarization, Online document clustering, Online market intelligence, Web usage profiling, Web data extraction, Social network extraction, Question answering systems, Online health care, Web knowledge management, Multimedia information retrieval, Navigation guides, User profiles extraction, Web-based distributed information systems, Web security applications, Internet of Things Applications and so on. The book is aimed for researchers and practitioner who are engaged in developing and applying intelligent systems principles for solving real-life problems. Further, it has been structured so that each chapter can be read independently of the others.

Persuasive Technology: 16th International Conference, PERSUASIVE 2021, Virtual Event, April 12–14, 2021, Proceedings (Lecture Notes in Computer Science #12684)

by Raian Ali Birgit Lugrin Fred Charles

This book constitutes the refereed post-conference proceedings of the 16th International Conference on Persuasive Technology, PERSUASIVE 2021, held as a virtual event, in April 2021. The 17 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 67 submissions. The papers are grouped in topical sections as follows: persuasive affective technology; digital marketing, ecommerce, etourism and smart ecosystems; and persuasion and education.

Evaluation of Novel Approaches to Software Engineering: 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020, Revised Selected Papers (Communications in Computer and Information Science #1375)

by Raian Ali Hermann Kaindl Leszek A. Maciaszek

This book constitutes selected, revised and extended papers of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2020, held in virtual format, in May 2020.The 19 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers included in this book contribute to the understanding of relevant trends of current research on novel approaches to software engineering for the development and maintenance of systems and applications, specically with relation to: model-driven software engineering, requirements engineering, empirical software engineering, service-oriented software engineering, business process management and engineering, knowledge management and engineering, reverse software engineering, software process improvement, software change and configuration management, software metrics, software patterns and refactoring, application integration, software architecture, cloud computing, and formal methods.

Evaluation of Novel Approaches to Software Engineering: 16th International Conference, ENASE 2021, Virtual Event, April 26-27, 2021, Revised Selected Papers (Communications in Computer and Information Science #1556)

by Raian Ali Hermann Kaindl Leszek A. Maciaszek

The present book includes extended and revised versions of a set of selected papers from the 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2021), held as an online event from April 26 to 27, 2021.The 15 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers included in this book contribute to the understanding of relevant trends of current research on novel approaches to software engineering for the development and maintenance of systems and applications, specically with relation to: model-driven software engineering, requirements engineering, empirical software engineering, service-oriented software engineering, business process management and engineering, knowledge management and engineering, reverse software engineering, software process improvement, software change and configuration management, software metrics, software patterns and refactoring, application integration, software architecture, cloud computing, and formal methods.

Persuasive Technology: 19th International Conference, PERSUASIVE 2024, Wollongong, NSW, Australia, April 10–12, 2024, Proceedings (Lecture Notes in Computer Science #14636)

by Raian Ali Nilufar Baghaei Kiemute Oyibo Khin Win

This book constitutes the refereed post-conference proceedings the 19th International Conference on Persuasive Technology, PERSUASIVE 2024 held in Wollongong, NSW, Australia, during April 10–12, 2024. The 14 revised full papers and 8 short papers presented in this book were carefully reviewed and selected from 51 submissions. based on their content: methods for tailoring and personalization; persuasive design and applications, persuasive strategies; and persuasive technologies and ethics.

Predictive Analytics for the Modern Enterprise: A Practitioner's Guide To Designing And Implementing Solutions

by Nooruddin Abbas Ali

The surging predictive analytics market is expected to grow from $10.5 billion today to $28 billion by 2026. With the rise in automation across industries, the increase in data-driven decision-making, and the proliferation of IoT devices, predictive analytics has become an operational necessity in today's forward-thinking companies.If you're a data professional, you need to be aligned with your company's business activities more than ever before. This practical book provides the background, tools, and best practices necessary to help you design, implement, and operationalize predictive analytics on-premises or in the cloud. Explore ways that predictive analytics can provide direct input back to your businessUnderstand mathematical tools commonly used in predictive analyticsLearn the development frameworks used in predictive analytics applicationsAppreciate the role of predictive analytics in the machine learning processExamine industry implementations of predictive analyticsBuild, train, and retrain predictive models using Python and TensorFlow

India, Habermas and the Normative Structure of Public Sphere

by Muzaffar Ali

This book examines how the contemporary Indian situation poses a strict theoretical challenge to Habermas’s theorization of the public sphere and employs the method of samvāda to critically analyse and dissect its universalist claims. It invites the reader to consider the possibility of imagining a normative Indian public sphere that is embedded in the Indian context—in a native and not nativist sense—to get past the derivative language of philosophical and political discourses prevalent within Indian academia. The book proposes that the dynamic cooperative space between Indian political theory and contemporary Indian philosophy is effectively suited to theorize the native idea of the Indian public sphere. It underlines the normative need for a natively theorized Indian public sphere to further the multilayered democratization of public spheres within diverse communities that constitute Indian society. The book will be a key read for contemporary studies in philosophy, political theory, sociology, postcolonial theory, history and media and communication studies.

Recent Trends and Future Technology in Applied Intelligence: 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings (Lecture Notes in Computer Science #10868)

by Moonis Ali Malek Mouhoub Otmane Ait Mohamed Samira Sadaoui

This book constitutes the thoroughly refereed proceedings of the 31st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, held in Montreal, QC, Canada, in June 2018.The 53 full papers and 33 short papers presented were carefully reviewed and selected from 146 submissions. They are organized in the following topical sections: constraint solving and optimization; data mining and knowledge discovery; evolutionary computation; expert systems and robotics; knowledge representation, machine learning; meta-heuristics; multi-agent systems; natural language processing; neural networks; planning, scheduling and spatial reasoning; rough sets, Internet of Things (IoT), ubiquitous computing and big data; data science, privacy, and security; inelligent systems approaches in information extraction; and artificial intelligence, law and justice.

Advances in Artificial Intelligence: 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part I (Lecture Notes in Computer Science #10350)

by Moonis Ali Salem Benferhat Karim Tabia

The two-volume set LNCS 10350 and 10351 constitutes the thoroughly refereed proceedings of the 30th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, held in Arras, France, in June 2017. The 70 revised full papers presented together with 45 short papers and 3 invited talks were carefully reviewed and selected from 180 submissions. They are organized in topical sections: constraints, planning, and optimization; data mining and machine learning; sensors, signal processing, and data fusion; recommender systems; decision support systems; knowledge representation and reasoning; navigation, control, and autonome agents; sentiment analysis and social media; games, computer vision; and animation; uncertainty management; graphical models: from theory to applications; anomaly detection; agronomy and artificial intelligence; applications of argumentation; intelligent systems in healthcare and mhealth for health outcomes; and innovative applications of textual analysis based on AI.

Advances in Artificial Intelligence: 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, Arras, France, June 27-30, 2017, Proceedings, Part II (Lecture Notes in Computer Science #10351)

by Moonis Ali Salem Benferhat Karim Tabia

The two-volume set LNCS 10350 and 10351 constitutes the thoroughly refereed proceedings of the 30th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, held in Arras, France, in June 2017. The 70 revised full papers presented together with 45 short papers and 3 invited talks were carefully reviewed and selected from 180 submissions. They are organized in topical sections: constraints, planning, and optimization; data mining and machine learning; sensors, signal processing, and data fusion; recommender systems; decision support systems; knowledge representation and reasoning; navigation, control, and autonome agents; sentiment analysis and social media; games, computer vision; and animation; uncertainty management; graphical models: from theory to applications; anomaly detection; agronomy and artificial intelligence; applications of argumentation; intelligent systems in healthcare and mhealth for health outcomes; and innovative applications of textual analysis based on AI.

Temporal and Spatial Environmental Impact of the COVID-19 Pandemic (Advances in Geographical and Environmental Sciences)

by Mohd Akhter Ali M. Kamraju

This book identifies, evaluates and reports the impacts of the COVID-19 pandemic on the physical, biological and socioeconomic environment, using the science and technology of geoinformatics. It encourages the environmental considerations in the future city and policy planning and decision-making. For example, according to the World Health Organization, 80% of people living in cities are exposed to polluted air that exceeds healthy levels. City planners have applied the developing concepts of sustainability to modern debates over how cities and regions should be reviewed, regenerated and reformed since the introduction of the concept in developmental science. During the COVID-19 pandemic, a remarkable drop in air pollution has been observed in India and other countries, which has accelerated the shift to green and sustainable development. Geoinformatics can provide solutions and resources for local, sustainable activities in education, health, sustainable agriculture, resource management and related fields. This book serves researchers in a variety of areas, including hazards, land surveys, remote sensing, cartography, geophysics, geology, natural resources, environment and geography.

Information Systems Research: Foundations, Design and Theory

by Mohammed Ali

This textbook will delve into the philosophical foundation of contemporary IS research design with particular emphasis on the methodological tools that can be applied to conduct effective research in the multidisciplinary area of contemporary IS. What sets the book apart is that it will cover the current social paradigm shift, global changes and the need for new methodological tools, which have revolutionised the way we use IS to support our daily practices. It considers the entire methodological procedures applied to research projects that investigate or explore multifaceted areas of contemporary IS, such as information management, digital business, ICT and information science.Featuring learning objectives, case studies, assessment questions and exercises, this textbook offers a practical outline for IS research methodology that will be of use to students and researchers. It aims to satisfy researchers who are seeking literature on applying methodological procedures to their research projects that delve into the world of contemporary IS that other titles have only considered in a much broader sense.

Advanced iOS 4 Programming

by Maher Ali

With Advanced iOS 4 Programming, developers have the expert guidance they need to create amazing applications for Apple's iPhone, iPad, and iPod touch.Inside, veteran mobile developer Dr. Maher Ali begins with a foundation introduction to Objective C and Cocoa Touch programming, and then guides readers through building apps with Apple's iPhone SDK 4 - including coverage of the major categories of new APIs and building apps for the new Apple iPad.This book concentrates on illustrating GUI concepts programmatically, allowing readers to fully appreciate the complete picture of iOS 4 development without relying on Interface Builder. In addition, Interface Builder is covered in several chapters.Advanced iOS 4 Programming delves into more advanced topics going beyond the basics of iOS 4 development, providing comprehensive coverage that will help you get your apps to the App Store quicker.Key features include:Objective-C programming language and runtimeInterface BuilderBuilding advanced mobile user interfacesCollectionsCocoa TouchCore Animation and Quartz 2DModel-view-controller (MVC) designsDeveloping for the iPadGrand Central DispatchParsing XML documents using SAX, DOM, and TouchXMLWorking with the Map Kit APIRemote and Local Push NotificationBlocks (closures) in Objective-CBuilding advanced location-based applicationsDeveloping database applications using the SQLite engineGameKit framework

Instant Node Package Manager

by Juzer Ali

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical exploration of the lifecycle of creating node modules as well as learning all of the top features that npm has to offer.Intended for readers who want to create their first node.js modules. The programming paradigm of JavaScript is not covered so a foundation in these concepts would be beneficial.

Refine Search

Showing 52,851 through 52,875 of 53,966 results