Browse Results

Showing 13,726 through 13,750 of 62,150 results

Confident Digital Content: Master the Fundamentals of Online Video, Design, Writing and Social Media to Supercharge Your Career (Confident Series)

by Adam Waters

<p><i>Confident Digital Content</i> gives you the opportunity to become digitally multi-skilled and learn the fundamentals of the most important types of digital creativity. Whatever your career path, being able to produce exciting and creative content online, whether through video, design, digital journalism or social media, can supercharge your professional career and empower your entrepreneurial pursuits. <p><i>Confident Digital Content</i>teaches you valuable hard skills, including how to create and upload great video content, graphic design, photography for social media, community management, digital strategy and metrics, and helps you learn them through practical exercises in every chapter. It also provides insightful guidance on how to boost your career and employability by honing your leadership, creativity and entrepreneurial skills in the world of digital. Case studies from inspiring individuals at organizations including CNN International, Mumsnet, Bunster's Hot Sauce, HuffPost UK, and Crocstar Media show you real world examples of excellent digital content in practice. This book is your ultimate guide to achieving the technical proficiency and confidence to start an inspiring digital career path, whether your ambition is to rise to the top of your chosen industry, be a successful freelancer or become an entrepreneur.</p>

Confident Voices: Digital Tools for Language Acquisition (Corwin Connected Educators Series)

by John T. Spencer

Engage your ELL students through technology! When it comes to technology integration, don’t overlook the needs of your ELL students. Introduce project-based learning into your classroom and utilize strategies to engage your ELL students and bridge the growing divide between technology and the ELL students that need it to thrive. Connected Educator John Spencer shows ELL educators how to combine technology with teaching in this easy-to-use guide to blended learning. Get ready to: Blend innovative technology with project-based learning Strengthen your students’ English language skills Engage your students through the intentional integration of digital tools The Corwin Connected Educators series is your key to unlocking the greatest resource available to all educators: other educators. Being a Connected Educator is more than a set of actions: it’s a belief in the potential of technology to fuel lifelong learning."John Spencer is the kind of teacher that I wish my own kids had and that all students deserve. This book shows clearly and practically how technology can be used to give all students greater choice and a more powerful voice. This book inspired me to rethink my own approach and what I′m planning to do in my classroom tomorrow." Philip Cummings, 6th Grade Teacher Presbyterian Day School "Spencer provides a clear framework for teachers to help students improve their language skills. A teacher can pick this book up and be provided with specific ideas and techniques which can be implemented in a classroom immediately." Josh Stumpenhorst, Teacher Lincoln Junior High School Naperville, IL

Confident Voices: Digital Tools for Language Acquisition (Corwin Connected Educators Series)

by John T. Spencer

Engage your ELL students through technology! When it comes to technology integration, don’t overlook the needs of your ELL students. Introduce project-based learning into your classroom and utilize strategies to engage your ELL students and bridge the growing divide between technology and the ELL students that need it to thrive. Connected Educator John Spencer shows ELL educators how to combine technology with teaching in this easy-to-use guide to blended learning. Get ready to: Blend innovative technology with project-based learning Strengthen your students’ English language skills Engage your students through the intentional integration of digital tools The Corwin Connected Educators series is your key to unlocking the greatest resource available to all educators: other educators. Being a Connected Educator is more than a set of actions: it’s a belief in the potential of technology to fuel lifelong learning."John Spencer is the kind of teacher that I wish my own kids had and that all students deserve. This book shows clearly and practically how technology can be used to give all students greater choice and a more powerful voice. This book inspired me to rethink my own approach and what I′m planning to do in my classroom tomorrow." Philip Cummings, 6th Grade Teacher Presbyterian Day School "Spencer provides a clear framework for teachers to help students improve their language skills. A teacher can pick this book up and be provided with specific ideas and techniques which can be implemented in a classroom immediately." Josh Stumpenhorst, Teacher Lincoln Junior High School Naperville, IL

Confident Web Design: How to Design and Create Websites and Futureproof Your Career (Confident Series)

by Kenny Wood

Do you need a website to support your freelance business or entrepreneurial venture? Or are you considering a career in web design? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge?Wherever you are in your career, Confident Web Design can help. The ultimate beginner's guide to designing, building and publishing basic websites, this book features exclusive online exercises to help you practice your new skills in context. Covering the basics of HTML, CSS and JavaScript, as well as giving you a thorough grounding in the real-life application of these principles, this book provides helpful examples, explanations of technical terms, and clear, easy-to-understand language - meaning your first website is only a few chapters away.Taking you on a practical journey to publish a basic website from scratch, the book's structure is designed to break down each skill into manageable chunks. Wherever you are in your career, let Confident Web Design give you that cutting edge with vital programming and design skills.About the Confident series...From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.

Confident Web Design: Master the Fundamentals of Website Creation and Supercharge Your Career (Confident Series)

by Kenny Wood

<p>This is your ultimate beginner's guide to the skills of web design. <i>Confident Web Design</i> takes you on a practical journey during which you will discover the techniques to allow you to publish a basic website from scratch. Whether you want to develop web design skills to set yourself apart in a competitive job market, power your entrepreneurial pursuits by creating a new website to showcase your product or business idea, or simply boost your professional performance in your current job, <i>Confident Web Design</i> is the perfect beginner's resource. <p>In <i>Confident Web Design</i>, each chapter is supported by exclusive online exercises to allow you to put your knowledge into practice and perfect the techniques. The book's structure is designed to break down each skill into manageable chunks, aided by helpful examples, technical term glossaries, tables and images to support you as you learn. Written in accessible and engaging language, author Kenny Wood shares his passion and enthusiasm for modern web design through this essential guide. <p>Online Resources include practical exercises for readers to test out their new skills and consolidate their learning.</p>

Confidential Computing: Hardware Based Memory Protection (Advanced Technologies and Societal Change)

by Vicente Garcia Diaz Gloria Jeanette Rincón Aponte

This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server’s hard drive if it is stolen while exposed in memory.​ As computing moves to span multiple environments—from on-premise to public cloud to edge—organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other’s data.

Confidentiality and Integrity in Crowdsourcing Systems (SpringerBriefs in Applied Sciences and Technology)

by Amin Ranj Bar Muthucumaru Maheswaran

Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

Configurable Intelligent Optimization Algorithm: Design and Practice in Manufacturing (Springer Series in Advanced Manufacturing)

by Lin Zhang Fei Tao Yuanjun Laili

Presenting the concept and design and implementation of configurable intelligent optimization algorithms in manufacturing systems, this book provides a new configuration method to optimize manufacturing processes. It provides a comprehensive elaboration of basic intelligent optimization algorithms, and demonstrates how their improvement, hybridization and parallelization can be applied to manufacturing. Furthermore, various applications of these intelligent optimization algorithms are exemplified in detail, chapter by chapter. The intelligent optimization algorithm is not just a single algorithm; instead it is a general advanced optimization mechanism which is highly scalable with robustness and randomness. Therefore, this book demonstrates the flexibility of these algorithms, as well as their robustness and reusability in order to solve mass complicated problems in manufacturing. Since the genetic algorithm was presented decades ago, a large number of intelligent optimization algorithms and their improvements have been developed. However, little work has been done to extend their applications and verify their competence in solving complicated problems in manufacturing. This book will provide an invaluable resource to students, researchers, consultants and industry professionals interested in engineering optimization. It will also be particularly useful to three groups of readers: algorithm beginners, optimization engineers and senior algorithm designers. It offers a detailed description of intelligent optimization algorithms to algorithm beginners; recommends new configurable design methods for optimization engineers, and provides future trends and challenges of the new configuration mechanism to senior algorithm designers.

Configuration Management with Chef-Solo

by Naveed Ur Rahman

This is a step-by-step guide, full of hands-on examples of real-world deployment tasks. Each topic is explained and placed in context, while also pointing out the key details of the concepts used. This book is aimed at system administrators and system engineers who have an understanding of configuration management tools and infrastructure. For novice administrators, it contains easy-to-use application recipes to get started immediately.

Configuration Management, Second Edition: Theory and Application for Engineers, Managers, and Practitioners

by Jon M. Quigley Kim L. Robertson

The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.

Configuring Advanced Windows Server® 2012 R2: Services Exam 70-412 (Microsoft Official Academic Course)

by Microsoft Official Academic Course Staff

This 70-412 Configuring Advanced Windows Server 2012 R2 Services textbook covers the third of three exams required for Microsoft Certified Solutions Associate (MCSA): Windows Server 2012 certification. This course will help validate the skills and knowledge necessary to administer a Windows Server 2012 Infrastructure in an enterprise environment. The three MCSA exams collectively validate the skills and knowledge necessary for implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. This Microsoft Official Academic Course is mapped to the 70-412 Configuring Advanced Windows Server 2012 Services exam skills, including the recent R2 objectives. This textbook focuses on real skills for real jobs and prepares students to prove mastery of Advanced Windows Server 2012 Services such as advanced configuring tasks necessary to deploy, manage, and maintain a Windows Server 2012 infrastructure.

Configuring IPCop Firewalls: Closing Borders with Open Source

by Barrie Dempster James Eaton-Lee

Anyone interested in securing their networks with IPCop â " from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

by Chong Ee

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design.

Configuring SAP ERP Financials and Controlling

by Peter Jones John Burger

SAP is the world leader in Enterprise Resource Planning (ERP) software; of the software?s modules, the FI (Finance) and CO (Controlling) are by far the most popular and are widely implemented. This book has no competition?it is the only book on the market on how to configure and implement SAP?s FI and CO modules to maximize functionality and features hands-on, step-by-step instructions and real-world examples that provide immediate and practical solutions. Updated for SAP?s ECC 6.0, the book covers FI enterprise structure, general ledger, substitutions and validations, automatic account assignments, accounts payable and receivable, asset accounting, accrual engine, closing entries, credit management, lockbox, CO enterprise structure, profitability analysis (CO-PA), and more.

Configuring SAP ERP Sales and Distribution

by Kapil Sharma Ashutosh Mutsaddi

The first and only book to offer detailed explanations of SAP ERP sales and distributionAs the only book to provide in-depth configuration of the Sales and Distribution (SD) module in the latest version of SAP ERP, this valuable resource presents you with step-by-step instruction, conceptual explanations, and plenty of examples. If you're an SD consultant or are in charge of managing an SAP implementation in your enterprise, you'll want this valuable resource at your sideSAP is one of the leading Enterprise Resource Planning (ERP) software products on the market, with over 40,000 implementationsCovers the latest version of SAP ERP-ECC 6.0Covers common through advanced configurations, so it's helpful no matter what your level of experience with SAPExplains the conceptual framework behind the configuration processIf your company uses the SD module, keep this indispensable guide on hand.

Configuring SonicWALL Firewalls

by Simon Desmeules Barry J. Stiefel

Configuring SonicWALL Firewal is the first book to deliver an indepth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.

Configuring User-Designer Relations: Interdisciplinary Perspectives (Computer Supported Cooperative Work)

by Mark Rouncefield Roger Slack Rob Procter Monika Büscher Mark Hartswood Alex Voss

'User-designer relations' concerns the sorts of working relationships that arise between developers and end users of IT products - the different ways designers of IT products seek to engage with users, and the ways users seek to influence product design. It is through the shifting patterns of these relations that IT products are realised. Although it has generally been accepted that achieving better user-designer relations will improve the quality of IT products, there has been little consensus on how this might be achieved. This book aims to deepen our understanding of the relationships between users and designers both as they emerge in the wild and as a consequence of our attempts to intervene. Through a series of case studies the book juxtaposes in-depth explorations of different perspectives and approaches to thinking about - and doing - user-designer relations, considering important implications for design and computer science more generally.

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801: Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

by Chris Gill Shannon Kuehn

Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGain practical knowledge to conquer the AZ-801 certification and tackle real-world challengesLearn to secure Windows Server in on-premises and hybrid infrastructuresLeverage hands-on examples to monitor and troubleshoot Windows Server environmentsBook DescriptionConfiguring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you'll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you'll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You'll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You'll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.What you will learnUnderstand the core exam objectives and successfully pass the AZ-801 examSecure Windows Server for on-premises and hybrid infrastructures using security best practicesImplement, manage, and monitor Windows Server high availability features successfullyConfigure and implement disaster recovery services using Hyper-V features, Azure Recovery Services, and Azure Site RecoveryExplore how to migrate various servers, workloads, and tools from previous versions of Windows Server to 2022Monitor and troubleshoot Windows Server environments in both on-premises and cloud workloads using Windows Server tools, Windows Admin Center, and Azure servicesWho this book is forThis book is for Cloud and Datacenter Management administrators and engineers, Enterprise Architects, Microsoft 365 Administrators, Network Engineers, and anyone seeking to gain additional working knowledge with Windows Server operating systems and managing on-premises, hybrid and cloud workloads with administrative tools. To get started, you'll need to have a basic understanding of how to configure advanced Windows Server services utilizing existing on-premises technology in combination with hybrid and cloud technologies.

Configuring the Networked Self

by Julie E. Cohen

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.

Confirming Justice—Or Injustice?: A Guide to Judging RBG's Successor

by Alan Dershowitz

In Confirming Justice—Or Injustice?, Alan Dershowitz—New York Times bestselling author and one of America&’s most respected legal scholars—contemplates the past, present, and future of the Supreme Court, from the death of Ruth Bader Ginsburg to the confirmation battle looming over President Trump&’s nomination of Judge Amy Coney Barrett. Alan Dershowitz has been called &“one of the most prominent and consistent defenders of civil liberties in America&” by Politico and &“the nation&’s most peripatetic civil liberties lawyer and one of its most distinguished defenders of individual rights&” by Newsweek. He is also a fair-minded and even-handed expert on the Constitution and American government, and in this book offers his knowledge and insight to help readers understand the current circumstances surrounding the Supreme Court and the looming partisan battle for its future. Confirming Justice—Or Injustice? is an analysis of every aspect of the possible confirmation of Judge Amy Coney Barrett to fill the vacant seat left by the death of Ruth Bader Ginsburg. It includes timely commentary on the history and process of confirming justices to the Supreme Court, notes about what might happen if the process is changed—such as by court packing or instituting age or term limits for justices—and discussion of the roles of the various people and groups who might have input on the confirmation, from the president to the senate to the judiciary committee to the Constitution itself. In the end, Confirming Justice—Or Injustice? represents an icon in American law and politics reckoning with an increasingly politicized and polarized nomination-and-confirmation process for judges and what those shifts might mean for the country, both now and in days to come. It is essential reading for anyone interested in or concerned about Trump's nomination of Amy Coney Barrett and the process of her possible confirmation, the legacy of Ruth Bader Ginsburg, and the future and fate of the Supreme Court—and American democracy itself.

Conflict Resolution Using the Graph Model: Strategic Interactions in Competition and Cooperation (Studies in Systems, Decision and Control #153)

by D. Marc Kilgour Keith W. Hipel Liping Fang Haiyan Xu

This cutting-edge book presents the theory and practice of the Graph Model for Conflict Resolution (GMCR), which is used for strategically investigating disputes in any field to enable informed decision making. It clearly explains how GMCR can determine what is the best a particular decision maker (DM) can independently achieve in dynamic interaction with others. Moves and counter-moves follow various stability definitions reflecting human behavior under conflict. The book defines a wide range of preference structures to represent a DM’s comparisons of states or scenarios: equally preferred, more or less preferred; unknown; degrees of strength of preference; and hybrid. It vividly describes how GMCR can ascertain whether a DM can fare even better by cooperating with others in a coalition. The book portrays how a conflict can evolve from the status quo to a desirable resolution, and provides a universal design for a decision support system to implement the innovative decision technologies using the matrix formulation of GMCR. Further, it illustrates the key ideas using real-world conflicts and supplies problems at the end of each chapter. As such, this highly instructive book benefits teachers, mentors, students and practitioners in any area where conflict arises.

Conflict Resolution and its Context: From the Analysis of Behavioural Patterns to Efficient Decision-Making (Law, Governance and Technology Series #18)

by Davide Carneiro Paulo Novais José Neves

This book studies how technological solutions can be used to alleviate the current state of legal systems, with their clogged up courtrooms and inefficient conflict resolution methods. It reviews the shortcomings and disadvantages of traditional and alternative conflict resolution methods and turns to Artificial Intelligence for problem-solving techniques and solutions. The book is divided into four parts. The first part presents a general and systematic analysis of the current state of the legal systems, identifying the main problems and their causes It then moves on to present UM Court: a framework for testing and prototyping conflict resolution services. This framework was developed with the objective of using Artificial Intelligence techniques to build a service environment for conflict resolution. The third part of the book takes a step into the future by analyzing the use of Intelligent Environments in the support of conflict management and resolution. It describes the approach taken and the experiments performed in the Intelligent Systems Lab of the University of Minho. The final part of the book contains the conclusions and shows the potential advantages of the use of Intelligent Environments as a way to implement better conflict resolution procedures (virtual or real), in which all the participants have access to more and better information and are able to take better informed decisions.

Conflict Resolution in Decision Making: Second International Workshop, COREDEMA 2016, The Hague, The Netherlands, August 29-30, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10238)

by Tim Baarslag Vicente Julian Reyhan Aydoğan Enrico Gerding Catholijn M. Jonker Victor Sanchez-Anguix

This book constitutes thoroughly revised selected papers of the Second International Workshop on Conflict and Resolution in Decision Makrung, COREDEMA 2016, held in The Hague, The Netherlands, in August 2016. The 9 revised papers presented were carefully reviewed and selected from 13 submissions. The 2nd International Workshop on Conflict Resolution in Decision Making (COREDEMA 2016) focuses on theoretical and practical computational approaches for solving and understanding conflict resolution.

Conflict and Cooperation in Cyberspace: The Challenge to National Security

by Adam B. Lowther Panayotis A. Yannakogeorgos

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, i

Conflicts, Crimes and Regulations in Cyberspace

by Sébastien-Yves Laurent

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.

Refine Search

Showing 13,726 through 13,750 of 62,150 results