Browse Results

Showing 12,076 through 12,100 of 53,657 results

Costume Design for Video Games: An Exploration of Historical and Fantastical Skins

by Sandy Appleoff Lyons

Costume Design for Video Games: An Exploration of Historical and Fantastical Skins explores the rich and colorful history of fashion throughout the ages. Each page goes into detail concerning the social significance of Iconic period pieces. From the real and the imagined, Costume Design for Video Games highlights the development of costumes and characters that pertain to plots, scenarios, and visionary goals, while also exploring silhouettes and the aesthetics of various eras. This survey of costume design for the video game market includes an exploration of the aesthetics of historical, fantasy, and futuristic influences. Not only does the text help in illustrating an assortment of styles, but Sandy Appleoff Lyons also helps to facilitate creative problem-solving as it applies to costume design and the design principles applied. This is uniquely done through a reader project, which in turn builds and implements research skills and the creation of authentic designs. Key Features: This book is not about replicating what already exists; it gives the reader the tools needed in order to understand the design principles and how to apply them to costumes. Through the comprehensive understanding of history, fashion, costumes, and cultural impacts, the readers will be able to expand their creativity and knowledge to help increase the narrative subtext and the stories of costumed figures. Readers are given tools for creative problem-solving to create authentic, original costumes. Text includes a glossary and sidebars covering materials rendering, color history, design principles, and meaning. Key terms and style sheets with layout training and cited historical examples help ground the reader with strong visuals.

The Couch Potato (The Food Group)

by Jory John

An Instant New York Times Bestseller * An Instant Indie Bestseller * An Indie Next List SelectionFeeling fried? Peel yourself on the couch and meet your new pal-tato! The winning fourth picture book from the #1 New York Times bestselling creators of The Bad Seed, The Good Egg, and The Cool Bean, Jory John and Pete Oswald, will get you and your kids moving!The Couch Potato has everything within reach and doesn't have to move from the sunken couch cushion. But when the electricity goes out, Couch Potato is forced to peel away from the comforts of the living room and venture outside. Could fresh air and sunshine possibly be better than the views on screen?Readers of all ages will laugh along as their new best spuddy learns that balancing screen time and playtime is the root to true happiness.Check out Jory John and Pete Oswald’s funny, bestselling books for kids 4-8 and anyone who wants a laugh:The Bad SeedThe Good EggThe Cool BeanThe Couch PotatoThe Good Egg Presents: The Great Eggscape!The Bad Seed Presents: The Good, the Bad, the Spooky!The Cool Bean Presents: As Cool as It GetsThat’s What Dinosaurs Do

Couchbase Essentials

by John Zablocki

This book is for those application developers who want to achieve greater flexibility and scalability from their software. Whether you are familiar with other NoSQL databases or have only used relational systems, this book will provide you with enough background to move you along at your own pace. If you are new to NoSQL document databases, the design discussions and introductory material will give you the information you need to get started with Couchbase.

CouchDB: Time to Relax (Animal Guide)

by Jan Lehnardt J. Chris Anderson Noah Slater

Three of CouchDB's creators show you how to use this document-oriented database as a standalone application framework or with high-volume, distributed applications. With its simple model for storing, processing, and accessing data, CouchDB is ideal for web applications that handle huge amounts of loosely structured data. That alone would stretch the limits of a relational database, yet CouchDB offers an open source solution that's reliable, scales easily, and responds quickly. CouchDB works with self-contained data that has loose or ad-hoc connections. It's a model that fits many real-world items, such as contacts, invoices, and receipts, but you'll discover that this database can easily handle data of any kind. With this book, you'll learn how to work with CouchDB through its RESTful web interface, and become familiar with key features such as simple document CRUD (create, read, update, delete), advanced MapReduce, deployment tuning, and more. Understand the basics of document-oriented storage and manipulation Interact with CouchDB entirely though HTTP using its RESTful interface Model data as self-contained JSON documents Handle evolving data schemas naturally Query and aggregate data in CouchDB using MapReduce views Replicate data between nodes Tune CouchDB for increased performance and reliability

CouchDB and PHP Web Development Beginner’s Guide

by Tim Juravich

Each chapter follows the creation of a social networking application with step-by-step instructions. This means that you will have easily created a complete, working application by the end of the book. This book is for beginner and intermediate PHP developers interested in using CouchDB development in their projects. Advanced PHP developers will appreciate the familiarity of the PHP architecture and can easily learn how to incorporate CouchDB into their existing development experiences.

Counsellor Competencies: Developing Counselling Skills for Education, Career and Occupation

by Bernd-Joachim Ertelt William E. Schulz Andreas Frey

Career and student counselling is a complex task that requires a high level of professionalism. This book introduces basic counselling skills in vocational and educational guidance. It is based on important scientific models. The book presents internationally recognized counselling approaches which include among others micro counselling, solution focused brief counselling and competence oriented counselling. It also addresses possibilities for the use of artificial intelligence. The book offers direct guidance for the consulting practice and supports competence development through case studies, tasks and didactically designed exercises. It is suitable as a guide for the training of consulting professionals in the field of career guidance.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

by Kim Zetter

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Counter Terrorism Issues: Case Studies in the Courtroom

by James Ottavio Castagnera

The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of

The Counterfeit Coin: Videogames and Fantasies of Empowerment

by Christopher Goetz

The Counterfeit Coin argues that games and related entertainment media have become almost inseparable from fantasy. In turn, these media are making fantasy itself visible in new ways. Though apparently asocial and egocentric—an internal mental image expressing the fulfillment of some wish—fantasy has become a key term in social contestations of the emerging medium. At issue is whose fantasies are catered to, who feels powerful and gets their way, and who is left out. This book seeks to undo the monolith of commercial gaming by locating multiplicity and difference within fantasy itself. It introduces and tracks three broad fantasy traditions that dynamically connect apparently distinct strata of a game (story and play), that join games to other media, and that encircle players in pleasurable loops as they follow these connections.

Countering Brandjacking in the Digital Age: … and Other Hidden Risks to Your Brand (SpringerBriefs in Computer Science)

by Christopher Hofman Simeon Keates

The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by others. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks. Brand owners need to be aware of the risks and of the need to develop strategies for identifying and managing them. This book details the process by which a brand owner can develop a brand risk management process to protect a brand's reputation and value. Rather than prescribe a one-size-fits-all approach, the authors provide guidance on how a brand risk management process can be tailored to particular needs and circumstances. This approach is underpinned by drawing on examples of best practice in the fields of risk management, interaction design and engineering design. This combined approach relies on developing an understanding of the risks faced by a particular brand owner, the full context of those risks and also the brand owner's capabilities for identifying and managing those risks. This book contains many real-world examples and interviews with a number of brand owning organisations ranging from small companies to large multinationals.

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)

by Sarah Freeman Andrew A. Bochman

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security #101)

by Reza Montasari

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book.

Counterinsurgency Scorecard: Afghanistan In Early 2011 Relative to the Insurgencies of the Past 30 Years

by Christopher Paul

A core finding of previous RAND research on 30 years of insurgencies worldwide was that a conflict's overall score on a scorecard of 15 equally weighted good and 12 equally weighted bad counterinsurgency factors and practices perfectly predicted the ultimate outcome. Using the scorecard approach and an expert elicitation (Delphi) exercise, a RAND project sought to extend the findings to the case of Afghanistan in early 2011.

Counterintelligence in a Cyber World

by Paul A. Watters

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.

Counterintuitive Marketing: Achieving Great Results Using Common Sense

by Kevin J. Clancy Peter C. Krieg

Why does American business seem to sputter along where it ought to thrive? What is the source of the current plague of downsizing, disappearing companies, dot-com crashes, and here-today-gone-tomorrow advertising campaigns? Why do more products flop than ever before? Marketing experts Kevin J. Clancy and Peter C. Krieg have the answers. In Counterintuitive Marketing, Clancy and Krieg trace the high rate of business failure back to bad marketing strategy, and the even worse implementation of that strategy. Excess testosterone, they argue, compels senior managers to make decisions intuitively, instinctively, quickly, and, unfortunately, disastrously. In this informative and enlightening book, Clancy and Krieg confront these "over-and-over-again" marketers, who don't have time to do it right the first time, but endless time and a company bankroll to do it wrong over and over again. The authors draw from their decades of consumer and business-to-business marketing experience to describe the intuitive decision-making practices that permeate business today, and demonstrate how these practices lead to disappointing performance. Chapter by chapter, Counterintuitive Marketing contrasts how marketing decisions are made today with how they should be made. The authors give equal treatment to targeting, positioning, product development, pricing, customer service, e-commerce, marketing planning, implementation, and more as they present counterintuitive ideas for building and introducing blockbuster marketing programs. Readers will discover in this iconoclastic treasure chest hundreds of penetrating insights that have enabled the authors' firm, Copernicus, to transform companies and become a "brand guardian" to the Fortune 500 and emerging businesses around the world. The tools to create exceptional marketing programs really do exist, and they are all here in Counterintuitive Marketing, the ultimate practical guide for any company of any size.

Counterterrorism: Reassessing the Policy Response

by Benoît Gomis

Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Beno�Gomis r

Counterterrorism and Cybersecurity: Total Information Awareness

by Newton Lee

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO's Supreme Allied Commander James Stavridis: "Instead of building walls to create security, we need to build bridges." The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: "If you control the code, you control the world." Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that "our problems are manmade -- therefore they can be solved by man [or woman]," as President John F. Kennedy said at the American University commencement in June 1963.

Counterterrorism and Open Source Intelligence (Lecture Notes in Social Networks #2)

by Uffe Wiil

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.

Coupled Mathematical Models for Physical and Biological Nanoscale Systems and Their Applications: Banff International Research Station, Banff, Canada, 28 August - 2 September 2016 (Springer Proceedings in Mathematics & Statistics #232)

by Luis L. Bonilla Efthimios Kaxiras Roderick Melnik

This volume gathers selected contributions from the participants of the Banff International Research Station (BIRS) workshop Coupled Mathematical Models for Physical and Biological Nanoscale Systems and their Applications, who explore various aspects of the analysis, modeling and applications of nanoscale systems, with a particular focus on low dimensional nanostructures and coupled mathematical models for their description. Due to the vastness, novelty and complexity of the interfaces between mathematical modeling and nanoscience and nanotechnology, many important areas in these disciplines remain largely unexplored. In their efforts to move forward, multidisciplinary research communities have come to a clear understanding that, along with experimental techniques, mathematical modeling and analysis have become crucial to the study, development and application of systems at the nanoscale. The conference, held at BIRS in autumn 2016, brought together experts from three different communities working in fields where coupled mathematical models for nanoscale and biosystems are especially relevant: mathematicians, physicists (both theorists and experimentalists), and computational scientists, including those dealing with biological nanostructures. Its objectives: summarize the state-of-the-art; identify and prioritize critical problems of major importance that require solutions; analyze existing methodologies; and explore promising approaches to addressing the challenges identified. The contributions offer up-to-date introductions to a range of topics in nano and biosystems, identify important challenges, assess current methodologies and explore promising approaches. As such, this book will benefit researchers in applied mathematics, as well as physicists and biologists interested in coupled mathematical models and their analysis for physical and biological nanoscale systems that concern applications in biotechnology and medicine, quantum information processing and optoelectronics.

The Coupling of Safety and Security: Exploring Interrelations in Theory and Practice (SpringerBriefs in Applied Sciences and Technology)

by Corinne Bieder Kenneth Pettersen Gould

This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively.The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.

Courageous Edventures: Navigating Obstacles to Discover Classroom Innovation (Corwin Teaching Essentials)

by Ms Jennie Magiera

Chart a course to innovation using educational technology. Let’s go on an edventure! Do you want to innovate and take risks in your teaching? Looking for ways to troubleshoot common classroom challenges? Jennie Magiera charts a course for you to discover your own version of innovation, using the limitless possibilities of educational technology. Packed with lesson plans, examples, and solutions, Courageous Edventures will show you: How to create your own Teacher-IEP (Innovation Exploration Plan) Strategies and solutions for tackling common educational technology problems Methods for putting learning into the hands of students How to find innovation in everyday places

Courageous Edventures: Navigating Obstacles to Discover Classroom Innovation (Corwin Teaching Essentials)

by Ms Jennie Magiera

Chart a course to innovation using educational technology. Let’s go on an edventure! Do you want to innovate and take risks in your teaching? Looking for ways to troubleshoot common classroom challenges? Jennie Magiera charts a course for you to discover your own version of innovation, using the limitless possibilities of educational technology. Packed with lesson plans, examples, and solutions, Courageous Edventures will show you: How to create your own Teacher-IEP (Innovation Exploration Plan) Strategies and solutions for tackling common educational technology problems Methods for putting learning into the hands of students How to find innovation in everyday places

The Courant–Friedrichs–Lewy (CFL) Condition

by Carlos A. de Moura Carlos S. Kubrusly

This volume comprises a carefully selected collection of articles emerging from and pertinent to the 2010 CFL-80 conference in Rio de Janeiro, celebrating the 80th anniversary of the Courant-Friedrichs-Lewy (CFL) condition. A major result in the field of numerical analysis, the CFL condition has influenced the research of many important mathematicians over the past eight decades, and this work is meant to take stock of its most important and current applications. The Courant-Friedrichs-Lewy (CFL) Condition: 80 Years After its Discovery will be of interest to practicing mathematicians, engineers, physicists, and graduate students who work with numerical methods.

A Course in Algebraic Error-Correcting Codes (Compact Textbooks in Mathematics)

by Simeon Ball

This textbook provides a rigorous mathematical perspective on error-correcting codes, starting with the basics and progressing through to the state-of-the-art. Algebraic, combinatorial, and geometric approaches to coding theory are adopted with the aim of highlighting how coding can have an important real-world impact. Because it carefully balances both theory and applications, this book will be an indispensable resource for readers seeking a timely treatment of error-correcting codes. Early chapters cover fundamental concepts, introducing Shannon’s theorem, asymptotically good codes and linear codes. The book then goes on to cover other types of codes including chapters on cyclic codes, maximum distance separable codes, LDPC codes, p-adic codes, amongst others. Those undertaking independent study will appreciate the helpful exercises with selected solutions. A Course in Algebraic Error-Correcting Codes suits an interdisciplinary audience at the Masters level, including students of mathematics, engineering, physics, and computer science. Advanced undergraduates will find this a useful resource as well. An understanding of linear algebra is assumed.

A Course in In-Memory Data Management: The Inner Mechanics of In-Memory Databases

by Hasso Plattner

Recent achievements in hardware and software development, such as multi-core CPUs and DRAM capacities of multiple terabytes per server, enabled the introduction of a revolutionary technology: in-memory data management. This technology supports the flexible and extremely fast analysis of massive amounts of enterprise data. Professor Hasso Plattner and his research group at the Hasso Plattner Institute in Potsdam, Germany, have been investigating and teaching the corresponding concepts and their adoption in the software industry for years. This book is based on the first online course on the openHPI e-learning platform, which was launched in autumn 2012 with more than 13,000 learners. The book is designed for students of computer science, software engineering, and IT related subjects. However, it addresses business experts, decision makers, software developers, technology experts, and IT analysts alike. Plattner and his group focus on exploring the inner mechanics of a column-oriented dictionary-encoded in-memory database. Covered topics include - amongst others - physical data storage and access, basic database operators, compression mechanisms, and parallel join algorithms. Beyond that, implications for future enterprise applications and their development are discussed. Readers are lead to understand the radical differences and advantages of the new technology over traditional row-oriented disk-based databases.

Refine Search

Showing 12,076 through 12,100 of 53,657 results