Browse Results

Showing 10,651 through 10,675 of 63,034 results

Central European Functional Programming School: 6th Summer School, CEFP 2015, Budapest, Hungary, July 6–10, 2015, Revised Selected Papers (Lecture Notes in Computer Science #10094)

by Viktória Zsók Zoltán Horváth Zoltán Porkoláb

This volume presents the revised lecture notes of selected talks given at the 6th Central European Functional Programming School, CEFP 2015, held in July 2015, in Budapest, Hungary.The 10 revised full papers presented were carefully reviewed and selected. The lectures covered a wide range of functional programming and C++ programming subjects.

Central and Eastern European Histories and Heritages in Video Games (ISSN)

by Paweł Schreiber Michał Mochocki Jakub Majewski Yaraslau I. Kot

This book explores the representations of Central and Eastern European histories in digital games.Focusing on games that examine a range of national histories and heritages from across Central and Eastern Europe, the volume looks beyond the diversity of the local histories depicted in games, and the audience reception of these histories, to show a diversity of approaches which can be used in examining historical games – from postcolonialism to identity politics to heritage studies. The book includes chapters on Serbia, Poland, Ukraine, Russia, Belarus, Hungary, Estonia, Slovakia, Czechia, Finland, and (a Western guest with regional connections) Luxembourg. Through the lens of video games, the authors address how nations struggle with the legacies of war, colonialism, and religious strife that have been a part of nation-building - but also how victimized cultures can survive, resist, and sometimes prevail.Appealing primarily to scholars in the fields of game studies, heritage studies, postcolonial criticism, and media studies, this book will be particularly useful for the subfields of historical game studies and postcolonial game studies.

Centrality and Diversity in Search: Roles in A.I., Machine Learning, Social Networks, and Pattern Recognition (SpringerBriefs in Intelligent Systems)

by M.N. Murty Anirban Biswas

The concepts of centrality and diversity are highly important in search algorithms, and play central roles in applications of artificial intelligence (AI), machine learning (ML), social networks, and pattern recognition. This work examines the significance of centrality and diversity in representation, regression, ranking, clustering, optimization, and classification. The text is designed to be accessible to a broad readership. Requiring only a basic background in undergraduate-level mathematics, the work is suitable for senior undergraduate and graduate students, as well as researchers working in machine learning, data mining, social networks, and pattern recognition.

Century 21 Computer Applications and Keyboarding (7th Edition)

by Jack P. Hoggatt Jon A. Shank Jerry W. Robinson

This 7th edition is a revision of Century 21 Keyboarding & Information Processing which reflects the changing keyboarding course. The complete course contains 150 keyboarding and word processing lessons, 54 computer apps lessons, and 15 new key learning lessons (in the Resources section).

Century 21™ Computer Applications and Keyboarding, Comprehensive, Lessons 1-150

by Jack P. Hoggatt Jon A. Shank

Provide students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition helps to prepare students for a lifetime of keyboarding success with a complete family of proven solutions updated for a new decade of business challenges. Students tap into the latest keyboarding technology, learn to master computer applications, and increase communication skills with the proven presentation from this best-selling text. Trust the leader who has taught more than 85 million to type--now bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions for you.

Century 21™ Computer Keyboarding: Essentials, Lessons 1-75

by Jack P. Hoggatt Jon A. Shank

Century 21 Computer Keyboarding gives you what you are looking for in a one semester course on new key learning, document formatting and word processing. This text is a combination of 50 lessons of key learning/ technique mastery and 25 lessons on word processing/document formatting.

Century 21™ Plus: Computer Applications with Document Formatting

by Karl Barksdale Jack Hoggatt Jon Shank

NIMAC-sourced textbook

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Computer Keyboarding, Essentials, Lessons 1-80

by Jack P. Hoggatt Jon A. Shank

CENTURY 21 COMPUTER KEYBOARDING provides everything you need for in a one-semester course covering new-key learning, document formatting, and word processing. This latest edition helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions. <P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these. </i>

Century 21® Computer Skills and Applications, Lessons 1–90

by Jack P. Hoggatt Jon A. Shank James R. Smith

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER SKILLS AND APPLICATIONS helps students prepare for a lifetime of keyboarding and computer success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2010/2013, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Jr., Input Technologies & Computer Applications

by Jack P. Hoggatt Jon A. Shank Karl Barksdale

Looking for a solution to get your students started in the computer world? This introductory text, CENTURY 21, JR. INPUT TECHNOLOGIES AND COMPUTER APPLICATIONS, 2e is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, handwriting recognition, speech recognition, tablet PCs, word processing, desktop publishing, spreadsheets, presentations, databases, HTML programming, and Web pages. CENTURY 21, JR. provides step-by-step guidance, with engaging activities labeled as Learn, Practice, and Apply. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2007.

Century 21® Jr.: Computer Applications With Keyboarding (Century 21 Keyboarding Ser.)

by Jack P. Hoggatt Jon A. Shank Jr. James R. Smith

NIMAC-sourced textbook

Century 21® Jr.: Computer Applications with Keyboarding

by Jack P. Hoggatt Jon A. Shank James R. Smith

Just getting started in the computer world? This introductory text, CENTURY 21(tm), JR. COMPUTER APPLICATIONS WITH KEYBOARDING, 3E is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, word processing, desktop publishing, spreadsheets, presentations, and databases. CENTURY 21, JR. provides step-by-step guidance, with engaging activities. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2013 and 365.

Ceph Cookbook

by Karan Singh

Over 100 effective recipes to help you design, implement, and manage the software-defined and massively scalable Ceph storage system About This Book * Implement a Ceph cluster successfully and gain deep insights into its best practices * Harness the abilities of experienced storage administrators and architects, and run your own software-defined storage system * This comprehensive, step-by-step guide will show you how to build and manage Ceph storage in production environment Who This Book Is For This book is aimed at storage and cloud system engineers, system administrators, and technical architects who are interested in building software-defined storage solutions to power their cloud and virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn this book is for you. What You Will Learn * Understand, install, configure, and manage the Ceph storage system * Get to grips with performance tuning and benchmarking, and gain practical tips to run Ceph in production * Integrate Ceph with OpenStack Cinder, Glance, and nova components * Deep dive into Ceph object storage, including s3, swift, and keystone integration * Build a Dropbox-like file sync and share service and Ceph federated gateway setup * Gain hands-on experience with Calamari and VSM for cluster monitoring * Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting * Understand advanced topics including erasure coding, CRUSH map, cache pool, and system maintenance In Detail Ceph is a unified, distributed storage system designed for excellent performance, reliability, and scalability. This cutting-edge technology has been transforming the storage industry, and is evolving rapidly as a leader in software-defined storage space, extending full support to cloud platforms such as Openstack and Cloudstack, including virtualization platforms. It is the most popular storage backend for Openstack, public, and private clouds, so is the first choice for a storage solution. Ceph is backed by RedHat and is developed by a thriving open source community of individual developers as well as several companies across the globe. This book takes you from a basic knowledge of Ceph to an expert understanding of the most advanced features, walking you through building up a production-grade Ceph storage cluster and helping you develop all the skills you need to plan, deploy, and effectively manage your Ceph cluster. Beginning with the basics, you'll create a Ceph cluster, followed by block, object, and file storage provisioning. Next, you'll get a step-by-step tutorial on integrating it with OpenStack and building a Dropbox-like object storage solution. We'll also take a look at federated architecture and CephFS, and you'll dive into Calamari and VSM for monitoring the Ceph environment. You'll develop expert knowledge on troubleshooting and benchmarking your Ceph storage cluster. Finally, you'll get to grips with the best practices to operate Ceph in a production environment. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.

Ceph Cookbook - Second Edition

by Karan Singh Michael Hackett Vikhyat Umrao

Over 100 effective recipes to help you design, implement, and troubleshoot manage the software-defined and massively scalable Ceph storage system. About This Book • Implement a Ceph cluster successfully and learn to manage it. • Recipe based approach in learning the most efficient software defined storage system • Implement best practices on improving efficiency and security of your storage cluster • Learn to troubleshoot common issues experienced in a Ceph cluster Who This Book Is For This book is targeted at storage and cloud engineers, system administrators, or anyone who is interested in building software defined storage, to power your cloud or virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn then this book is for you What You Will Learn • Understand, install, configure, and manage the Ceph storage system • Get to grips with performance tuning and benchmarking, and learn practical tips to help run Ceph in production • Integrate Ceph with OpenStack Cinder, Glance, and Nova components • Deep dive into Ceph object storage, including S3, Swift, and Keystone integration • Configure a disaster recovery solution with a Ceph Multi-Site V2 gateway setup and RADOS Block Device mirroring • Gain hands-on experience with Ceph Metrics and VSM for cluster monitoring • Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting • Understand advanced topics including erasure-coding, CRUSH map, cache pool, and general Ceph cluster maintenance In Detail Ceph is a unified distributed storage system designed for reliability and scalability. This technology has been transforming the software-defined storage industry and is evolving rapidly as a leader with its wide range of support for popular cloud platforms such as OpenStack, and CloudStack, and also for virtualized platforms. Ceph is backed by Red Hat and has been developed by community of developers which has gained immense traction in recent years. This book will guide you right from the basics of Ceph , such as creating blocks, object storage, and filesystem access, to advanced concepts such as cloud integration solutions. The book will also cover practical and easy to implement recipes on CephFS, RGW, and RBD with respect to the major stable release of Ceph Jewel. Towards the end of the book, recipes based on troubleshooting and best practices will help you get to grips with managing Ceph storage in a production environment. By the end of this book, you will have practical, hands-on experience of using Ceph efficiently for your storage requirements. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.

Ceph: Design, implement, and manage software-defined storage solutions that provide excellent performance

by Karan Singh Michael Hackett Anthony D'Atri Vikhyat Umrao Nick Fisk

Get to grips with the unified, highly scalable distributed storage system and learn how to design and implement it. Key Features Explore Ceph's architecture in detail Implement a Ceph cluster successfully and gain deep insights into its best practices Leverage the advanced features of Ceph, including erasure coding, tiering, and BlueStore Book Description This Learning Path takes you through the basics of Ceph all the way to gaining in-depth understanding of its advanced features. You'll gather skills to plan, deploy, and manage your Ceph cluster. After an introduction to the Ceph architecture and its core projects, you'll be able to set up a Ceph cluster and learn how to monitor its health, improve its performance, and troubleshoot any issues. By following the step-by-step approach of this Learning Path, you'll learn how Ceph integrates with OpenStack, Glance, Manila, Swift, and Cinder. With knowledge of federated architecture and CephFS, you'll use Calamari and VSM to monitor the Ceph environment. In the upcoming chapters, you'll study the key areas of Ceph, including BlueStore, erasure coding, and cache tiering. More specifically, you'll discover what they can do for your storage system. In the concluding chapters, you will develop applications that use Librados and distributed computations with shared object classes, and see how Ceph and its supporting infrastructure can be optimized. By the end of this Learning Path, you'll have the practical knowledge of operating Ceph in a production environment. This Learning Path includes content from the following Packt products: Ceph Cookbook by Michael Hackett, Vikhyat Umrao and Karan Singh Mastering Ceph by Nick Fisk Learning Ceph, Second Edition by Anthony D'Atri, Vaibhav Bhembre and Karan Singh What you will learn Understand the benefits of using Ceph as a storage solution Combine Ceph with OpenStack, Cinder, Glance, and Nova components Set up a test cluster with Ansible and virtual machine with VirtualBox Develop solutions with Librados and shared object classes Configure BlueStore and see its interaction with other configurations Tune, monitor, and recover storage systems effectively Build an erasure-coded pool by selecting intelligent parameters Who this book is for If you are a developer, system administrator, storage professional, or cloud engineer who wants to understand how to deploy a Ceph cluster, this Learning Path is ideal for you. It will help you discover ways in which Ceph features can solve your data storage problems. Basic knowledge of storage systems and GNU/Linux will be beneficial.

Cerebral Aneurysm Detection and Analysis: First Challenge, CADA 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 8, 2020, Proceedings (Lecture Notes in Computer Science #12643)

by Anja Hennemuth Leonid Goubergrits Matthias Ivantsits Jan-Martin Kuhnigk

This book constitutes the First Cerebral Aneurysm Detection Challenge, CADA 2020, which was held in conjunction with the 23rd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2020, in October 2020. The conference was planned to take place in Lima, Peru, and took place virtually due to the COVID-19 pandemic. The 9 regular papers presented in this volume, together with an overview and one introduction paper, were carefully reviewed and selected for inclusion in the book. The papers were organized in topical sections as follows: cerebral aneurysm detection; cerebral aneurysm segmentation; and cerebral aneurysm rupture risk estimation.

Certificate of Cloud Security Knowledge (CCSK v5) Official Study Guide: In-Depth Guidance and Practice

by Graham Thompson

As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many. Author Graham Thompson offers you in-depth guidance and practical tools not only to pass the exam but also to grasp the broader implications of cloud security. This book is filled with real-world examples, targeted practice questions, and the latest on zero trust and AI security—all designed to mirror the actual exam. By reading this book, you will: Understand critical topics such as cloud architecture, governance, compliance, and risk management Prepare for the exam with chapter tips, concise reviews, and practice questions to enhance retention See the latest on securing different workloads (containers, PaaS, FaaS) and on incident response in the cloud Equip yourself with the knowledge necessary for significant career advancement in cloud security

Certifications of Critical Systems – The CECRIS Experience: The Cecris Experience (River Publishers Series In Information Science And Technology Ser.)

by Andrea Bondavalli Francesco Brancati

In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.

Certified Ethical Hacker (CEH) Foundation Guide

by Sagar Ajay Rahalkar

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is ForBeginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

by Ahmed Sheikh

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with FootprintingPerform active and passive reconnaissanceIdentify enumeration countermeasuresBe familiar with virus types, virus detection methods, and virus countermeasuresKnow the proper order of steps used to conduct a session hijacking attackIdentify defensive strategies against SQL injection attacksAnalyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more

Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice

by Matt Walker

The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing exam will either leave you better prepared to be the best cyber security professional you can be. But preparing for the exam itself needn't be that way. In this book, IT security and education professional Matt Walker will not only guide you through everything you need to pass the exam, but do so in a way that is actually enjoyable. The subject matter need not be dry and exhausting, and we won't make it that way. You should finish this book looking forward to your exam and your future. To help you successfully complete the CEH certification, this book will bring penetration testers, cybersecurity engineers, and cybersecurity analysts up to speed on: Information security and ethical hacking fundamentals Reconnaissance techniques System hacking phases and attack techniques Network and perimeter hacking Web application hacking Wireless network hacking Mobile, platform, IoT, and OT hacking Cloud computing Cryptography Penetration testing techniques Matt Walker is an IT security and education professional with more than 20 years of experience. He's served in a variety of cyber security, education, and leadership roles throughout his career.

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities

by Christopher Rees Dale Meredith

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification examKey FeaturesLearn how to look at technology from the standpoint of an attackerUnderstand the methods that attackers use to infiltrate networksPrepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsBook DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.What you will learnGet to grips with information security and ethical hackingUndertake footprinting and reconnaissance to gain primary information about a potential targetPerform vulnerability analysis as a means of gaining visibility of known security weaknessesBecome familiar with the tools and techniques used by an attacker to hack into a target systemDiscover how network sniffing works and ways to keep your information secureExplore the social engineering techniques attackers use to compromise systemsWho this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Certified Function Point Specialist Examination Guide

by David Garmus Janet Russac Royce Edwards

The Certified Function Point Specialist Examination Guide provides a complete and authoritative review of the rules and guidelines prescribed in the release of version 4.3 of the Function Point Counting Practices Manual (CPM). Providing a fundamental understanding of the IFPUG Functional Size Measurement method, this is the ideal study guide for th

Refine Search

Showing 10,651 through 10,675 of 63,034 results