Browse Results

Showing 55,926 through 55,950 of 62,931 results

The Culture and Communities Mapping Project

by Morgan Currie Melisa Miranda Correa

This book describes three years of work by the Culture and Communities Mapping Project, a research project based in Edinburgh that uses maps as an object of study and also a means to facilitate research. Taking a self-reflexive approach, the book draws on a variety of iterative mapping procedures and visual methodologies, from online virtual tours to photo elicitation, to capture the voices of inhabitants and their distinctive perspectives on the city. The book argues that practices of cultural mapping consist of a research field in and of itself, and it situates this work in relation to other areas of research and practice, including critical cartography, cultural geography, critical GIS, activist mapping and artist maps. The book also offers a range of practical approaches towards using print and web-based maps to give visibility to spaces traditionally left out of city representations but that are important to the local communities that use them. Throughout, the authors reflect critically on how, through the processes of mapping, we create knowledge about space, place, community and culture.

The Culture of Big Data

by Mike Barlow

Technology does not exist in a vacuum. In the same way that a plant needs water and nourishment to grow, technology needs people and process to thrive and succeed. Culture (i.e., people and process) is integral and critical to the success of any new technology deployment or implementation. Big data is not just a technology phenomenon. It has a cultural dimension. It's vitally important to remember that most people have not considered the immense difference between a world seen through the lens of a traditional relational database system and a world seen through the lens of a Hadoop Distributed File System.This paper broadly describes the cultural challenges that accompany efforts to create and sustain big data initiatives in an evolving world whose data management processes are rooted firmly in traditional data warehouse architectures.

The Culture of Digital Fighting Games: Performance and Practice (Routledge Studies in New Media and Cyberculture)

by Todd Harper

This book examines the complex network of influences that collide in the culture of digital fighting games. Players from all over the world engage in competitive combat with one another, forming communities in both real and virtual spaces, attending tournaments and battling online via internet-connected home game consoles. But what is the logic behind their shared playstyle and culture? What are the threads that tie them together, and how does this inform our understanding of competitive gaming, community, and identity? Informed by observations made at one of the biggest fighting game events in the world – the Evolution Series tournament, or "EVO" – and interviews with fighting game players themselves, this book covers everything from the influence of arcade spaces, to the place of gender and ethnicity in the community, to the clash of philosophies over how these games should be played in the first place. In the process, it establishes the role of technology, gameplay, and community in how these players define both themselves and the games that they play.

The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects (Synthesis Lectures on Information Security, Privacy, and Trust)

by Simone Fischer-Hübner Farzaneh Karegar

This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research, practices, and challenges, the book illuminates for readers the often shadowy corridors of such a multifaceted domain and offers guidelines and solutions to successfully traverse the challenging maze. The book does not simply focus on data protection or legislative frameworks but also on what it takes for privacy to be safeguarded, understood, embraced, and easily practiced by all. It begins with a thorough exploration of the background of privacy tools and technologies, the evolution of privacy rules and regulations, and the backdrop upon which this narrative unfolds. After establishing this context, its next important focus is the current state and future directions of the field, including thefrontiers of usable privacy research in relation to the Internet of Things (IoT), usability of PETs, and usable privacy for UX and software developers. The book also considers the often-overlooked privacy narratives of marginalized communities and delves into the complexities of user-centric privacy. Readers are provided with a blueprint for addressing these hurdles and establishing pathways for a more privacy-conscious world. The text will be of interest to students studying Computer Science, Information Systems, or Law, as well as researchers and practitioners working in the fields of usable privacy, privacy by design, Privacy-Enhancing Technologies (PETs), or HCI. All will benefit from the book’s central deliberation of a question that echoes through time and technological advancements: why does usable privacy matter?

The Curve

by Nicholas Lovell

It's the ultimate business question of our time: How do real companies make money when customers expect (and often get) products for free? There are millions of potential customers in the world. Most of them won't pay anything for your product. But some will pay almost anything. The challenge is to find the latter without wasting time and money on the former. In The Curve, Nicholas Lovell weaves together stories from disparate industries to show how smart companies are solving this puzzle. From video games to pop music to model trains, the Internet helps businesses forge direct relationships with a vast global audience by building communities and offering bespoke products and experiences. In many cases, businesses can win by sharing their product (or a version of their product) for free, allowing it to spread as widely as possible. Eventually, a huge number of freeloaders spread the word to the superfans who value that product the most. And a small number of superfans will love a product so much that they will spend substantial sums of money on it--given the chance. These high-value customers are enough to fuel a profitable business. For example: Nine Inch Nails front man Trent Reznor gave away his album for free to find the 2,500 hardcore fans who wanted the $300 limited ultradeluxe edition. Bigpoint, an independent game developer, released three adventure games to 130 million users--and made 80 percent of its $80 million revenue from just 23,000 users, who spent money to upgrade their game-playing arsenal. King Arthur Flour shares useful recipes and tips on its Web site, enchanting a cult of devoted bakers, many of whom happily travel to its Vermont headquarters for expensive specialty baking classes. This approach doesn't apply just to digital products anymore. With the advent of 3D printing, customization of physical goods is easier and cheap, and companies can truly tailor their offerings to their customers. A doll company can personalize everything from hair color to eye shape, and automakers and technicians can create laser-scanned replacement parts for classic cars. Although the potential for piracy will spread to industries that believed they were immune to such disruption, businesses have an opportunity to make money in this new paradigm by offering variety, complexity, and flexibility at little to no extra cost. What Lovell calls the Curve is a ranking of your company's potential customers from those most likely to least likely to pay for your product or service. It charts their interest against the amount they are prepared to spend--be it nothing at all or thousands of dollars. The curve itself separates your revenue opportunity (willing big spenders, your superfans) on the left from your marketing opportunity (freeloaders, whose only acceptable price point is $0) on the right. The area under the curve is the total amount of money you might be able to get from your customers or fans. Lovell offers a strategy to draw more people into your orbit than was possible when physical costs limited your ability to expand. The Curve heralds a new era of creativity and business freedom.

The Customer of the Future: 10 Guiding Principles for Winning Tomorrow's Business

by Blake Morgan

Tomorrow’s customers need to be targeted today!With emerging technology transforming customer expectations, it’s more important than ever to keep a laser focus on the experience companies provide their customers.In The Customer of the Future, customer experience futurist Blake Morgan outlines ten easy-to-follow customer experience guidelines that integrate emerging technologies with effective strategies to combat disconnected processes, silo mentalities, and a lack of buyer perspective.Tomorrow’s customers will insist on experiences that make their lives significantly easier and better. Companies will win their business not by just proclaiming that customer experience is a priority but by embedding a customer focus into every aspect of their operations. They’ll understand how emerging technologies like artificial intelligence (AI), automation, and analytics are changing the game and craft a strategy to integrate them into their products and processes.The Customer of the Future explains how today’s customers are already demanding frictionless, personalized, on-demand experiences from their products and services, and companies that don’t adapt to these new expectations won’t last. This book prepares your organization for these increas­ing demands by helping you do the following:Learn the ten defining strategies for a customer experience–focused company.Implement new techniques to shift the entire company from being product-focused to being customer-focused.Gain insights through case studies and examples on how the world’s most innovative companies are offering new and compelling customer experiences.Craft a leadership development and culture plan to create lasting change at your organization.

The Customer-Driven Playbook: Converting Customer Feedback into Successful Products

by Travis Lowdermilk Jessica Rich

Despite the wide acceptance of Lean approaches and customer-development strategies, many product teams still have difficulty putting these principles into meaningful action. That’s where The Customer-Driven Playbook comes in. This practical guide provides a complete end-to-end process that will help you understand customers, identify their problems, conceptualize new ideas, and create fantastic products they’ll love.To build successful products, you need to continually test your assumptions about your customers and the products you build. This book shows team leads, researchers, designers, and managers how to use the Hypothesis Progression Framework (HPF) to formulate, experiment with, and make sense of critical customer and product assumptions at every stage. With helpful tips, real-world examples, and complete guides, you’ll quickly learn how to turn Lean theory into action.Collect and formulate your assumptions into hypotheses that can be tested to unlock meaningful insightsConduct experiments to create a continual cadence of learningDerive patterns and meaning from the feedback you’ve collected from customersImprove your confidence when making strategic business and product decisionsTrack the progression of your assumptions, hypotheses, early ideas, concepts, and product features with step-by-step playbooksImprove customer satisfaction by creating a consistent feedback loop

The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse (Survival Ser.)

by Nick Selby Heather Vescent

Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online. As we live more of our lives online, we need to be more aware of the risks we face—and what we can do to protect ourselves. We all know that our identities can be stolen, and that intellectual property can be copied and sold. But even scarier things are now possible. Vehicle systems can be hacked, our power grid can be sabotaged, and terrorists are getting more sophisticated by the day. In The Cyber Attack Survival Manual, you learn hands-on tips and techniques for fighting back. Author Nick Selby, a police detective who specializes in busting cybercriminals, gathers a consortium of experts in digital currency, crimeware, intelligence, and more in order to share the latest and best security techniques. The Cyber Attack Survival Manual covers: Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards, and much more. Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, Bitcoin, and what they mean to individuals and society at large. Global issues: the NSA, how hackers can crash your car, and looming threats from China and elsewhere.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

by Mary Aiken

Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping our perception of the world, development and behaviour, societal norms and values, children, safety and security.Covering everything from the impact of screens on the developing child to the explosion of teen sexting, and the acceleration of compulsive and addictive online behaviours (gaming, shopping, pornography), The Cyber Effect also examines the escalation in cyberchondria (self-diagnosis online), cyberstalking and organized crime in the Deep Web. Cyberspace is an environment full of surveillance, but who is looking out for us? Full of surprising statistics and incredible-but-true case studies of the hidden trends that are shaping our culture, this book raises troubling questions about where the digital revolution is taking us.Upending your assumptions about your online life and forever changing the way you think about the technology that you, your friends and your family use, The Cyber Effect offers a fascinating and chilling look at a future we can still do something about.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

by Mary Aiken

From the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, forensics and technology - comes a groundbreaking exploration of the impact of technology on human behaviour. The average person now checks their phone over 200 times a day. That's a serious addiction - but because we're all doing it all the time, it doesn't seem quite so scary. And, like all addicts, we have avoided thinking about the implications of the cyber effect. But now, at last, there is someone who can explain what is happening to us, how it works and what we can do about it. In this, the first book of its kind, Dr Mary Aiken applies her expertise in cyber-behavioural analysis to a range of subjects including criminal activity on the Deep Web and Darknet; deviant behaviour; internet addictions; the impact of technology on the developing child; teenagers and the Web; cyber romance and cyber friendships; cyberchrondria; the future of artificial intelligence; and the positive effects on our digital selves, such as online altruism. Packed with vivid stories, eye-opening insights and surprising statistics, The Cyber Effect offers us a fascinating guide through a new future that it's not too late to do something about.(P) 2016 Penguin Random House Audio

The Cyber Security Network Guide (Studies in Systems, Decision and Control #274)

by Fiedelholtz

This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats. It includes updated processes in response to asymmetric threats, as well as descriptions of the current tools to mitigate cyber threats. Featuring comprehensive computer science material relating to a complete network baseline with the characterization hardware and software configuration, the book also identifies potential emerging cyber threats and the vulnerabilities of the network architecture to provide students with a guide to responding to threats. The book is intended for undergraduate and graduate college students who are unfamiliar with the cyber paradigm and processes in responding to attacks.

The Cyber-Creativity Process: How Humans Co-Create with Artificial Intelligence (The Seven C’s of Creativity)

by Giovanni Emanuele Corazza

This edited book explores the process of creating using the seven C's of creativity framework. It discusses the creative process as a collaboration between humans and Artificial Intelligence (AI), here identified as the cyber-creativity process. Through nine chapters written by leading scholars in the field, this collection delves into the rapidly emerging area of Generative-AI (Gen-AI) applications and sheds light on the parts of the creative process that will remain fundamentally human throughout the foreseeable future, as well as those that will benefit more from AI-augmentation. Drawing on the dynamic definition of creativity, the contents encompass the Dynamic Universal Creative Process (DUCP) and the DA VINCI model, the design principles of Gen-AI algorithms, the cyber-creativity process in education, journalism, design, fashion, music, and its implications on intellectual property protection. A timely reflection on the complex and evolving relation between creativity and technology, this volume will interest academics, researchers, and students alike across humanities, social and hard sciences.

The Cybernetic Society: How Humans and Machines Will Shape the Future Together

by Amir Husain

"An optimistic, shimmering image of a world where AI operates in service to humankind" (Kirkus) argues that both the major risk and opportunity of AI is that humans and computers have fused, giving AI the ability to shape the future of human affairs Artificial intelligence is inescapable: at home, at work, in politics, and on the battlefield. In The Cybernetic Society, technologist Amir Husain argues that AI hasn&’t simply encroached on everything we do. It has become part of us, and we, it. Humans and intelligent machines, he argues, are enmeshed in a symbiotic hybrid that he calls a &“cybernetic society.&” Husain describes a present and future where AI isn&’t a tool of humans but our equal partner, one where they can realize their own visions of the world. There is great potential and danger: Saudi Arabia&’s Neom—a &“cognitive city&” being built in inhospitable desert—shows how this symbiosis can make life possible where otherwise, it is not. But the profusion of intelligent military drones is making mass destruction possible where otherwise, it is not. As engrossing as it is urgent, The Cybernetic Society offers a new understanding of this revolutionary fusion of machine and mankind, and its profound implications for all our futures. The path ahead is challenging. But Husain shows why we can live harmoniously with our creations.

The Cybernetics Moment: Or Why We Call Our Age the Information Age (New Studies in American Intellectual and Cultural History)

by Ronald R. Kline

How did cybernetics and information theory arise, and how did they come to dominate fields as diverse as engineering, biology, and the social sciences?Winner of the CHOICE Outstanding Academic Title of the Choice ACRLOutstanding Academic Title, ChoiceCybernetics—the science of communication and control as it applies to machines and to humans—originates from efforts during World War II to build automatic antiaircraft systems. Following the war, this science extended beyond military needs to examine all systems that rely on information and feedback, from the level of the cell to that of society. In The Cybernetics Moment, Ronald R. Kline, a senior historian of technology, examines the intellectual and cultural history of cybernetics and information theory, whose language of "information," "feedback," and "control" transformed the idiom of the sciences, hastened the development of information technologies, and laid the conceptual foundation for what we now call the Information Age. Kline argues that, for about twenty years after 1950, the growth of cybernetics and information theory and ever-more-powerful computers produced a utopian information narrative—an enthusiasm for information science that influenced natural scientists, social scientists, engineers, humanists, policymakers, public intellectuals, and journalists, all of whom struggled to come to grips with new relationships between humans and intelligent machines.Kline traces the relationship between the invention of computers and communication systems and the rise, decline, and transformation of cybernetics by analyzing the lives and work of such notables as Norbert Wiener, Claude Shannon, Warren McCulloch, Margaret Mead, Gregory Bateson, and Herbert Simon. Ultimately, he reveals the crucial role played by the cybernetics moment—when cybernetics and information theory were seen as universal sciences—in setting the stage for our current preoccupation with information technologies.

The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Internal Audit and IT Audit)

by Anne Kohnke Ken Sigler Daniel Shoemaker

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management, software assurance, and cybersecurity.

The Cybersecurity Control Playbook: From Fundamentals to Advanced Strategies

by Jason Edwards

Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers a step-by-step guide for implementing cybersecurity controls that will protect businesses and prepare them to compete in an overwhelmingly networked landscape. With balanced coverage of both foundational and advanced topics, and concrete examples throughout, this is a must-own resource for professionals looking to keep their businesses safe and secure. Readers will also find: Clear, jargon-free language that makes it accessible to a wide range of readersAn introduction to developing, deploying, monitoring, testing, and retiring controls and control frameworks across large, medium, and small enterprisesA system for identifying, prioritizing, and managing cyber risks based on the MITRE ATT&CK framework, with additional coverage of other key cybersecurity frameworks The Cybersecurity Control Playbook is ideal for cybersecurity practitioners, IT professionals, and security managers who are responsible for implementing and managing cybersecurity strategies in their organizations.

The Cybersecurity Guide to Governance, Risk, and Compliance

by Jason Edwards Griffin Weaver

The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: Over 1300 actionable recommendations found after each section Detailed discussion of topics including AI, cloud, and quantum computing More than 70 ready-to-use KPIs and KRIs “This guide’s coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical.” —GARY MCALUM, CISO “This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)”. —WIL BENNETT, CISO

The Cybersecurity Manager's Guide: The Art Of Building Your Security Program

by Todd Barnum

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow.Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one.Build better relationships across the organizationAlign your role with your company's values, culture, and tolerance for information lossLay the groundwork for your security programCreate a communications program to share your team's contributions and educate your coworkersTransition security functions and responsibilities to other teamsOrganize and build an effective InfoSec teamMeasure your company's ability to recognize and report security policy violations and phishing emails

The Cybersecurity Playbook for Modern Enterprise: An End-to-end Guide To Preventing Data Breaches And Cyber Attacks

by Jeremy Wittkop

This book is for security practitioners, including analysts, engineers, or CISOs, who want to better understand cybersecurity challenges. It is also for beginners who want to get a holistic view of information security to prepare for a career in the cybersecurity field. Business leaders looking to learn about cyber threats and how they can protect their organizations from harm will find this book especially useful. Whether you're a beginner or a seasoned cybersecurity professional, this book has something new for everyone.

The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security

by Allison Cerra

The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.

The Cybersecurity Self-Help Guide

by Arun Soni

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense

by Donnie W. Wendt

This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. Who This Book is for: The primary audience is cybersecurity professionals looking to improve their organization's security posture by leveraging AI and ML-based security tools and combining them into a comprehensive strategy incorporating automation and ACD. This target audience will have a cybersecurity background and an interest in AI and ML. Higher education would be a secondary audience.

The Cyborg Handbook

by Chris Hables Gray Steven Mentor Heidi J. Figueroa-Sarriera

This handbook brings together key documents from the history of cyborgs as well as the best writing about cyborgs, including recent cyborg cutural theory. They cover the space technology, war, medicine and the imagination in the production of cyborgs.

The Cyborg Subject

by Garfield Benjamin

This book outlines a new conception of the cyborg in terms of consciousness as the parallax gap between physical and digital worlds. The contemporary subject constructs its own internal reality in the interplay of the Virtual and the Real. Reinterpreting the work of Slavoj Žižek and Gilles Deleuze in terms of the psychological and ontological construction of the digital, alongside the philosophy of quantum physics, this book offers a challenge to materialist perspectives in the fluid cyberspace that is ever permeating our lives. The inclusion of the subject in its own epistemological framework establishes a model for an engaged spectatorship of reality. Through the analysis of online media, digital art, avatars, computer games and science fiction, a new model of cyborg culture reveals the opportunities for critical and creative interventions in the contemporary subjective experience, promoting an awareness of the parallax position we all occupy between physical and digital worlds.

The DAM Book: Digital Asset Management for Photographers (O'reilly Ser.)

by Peter Krogh

One of the main concerns for digital photographers today is asset management: how to file, find, protect, and re-use their photos. The best solutions can be found in The DAM Book, our bestselling guide to managing digital images efficiently and effectively. Anyone who shoots, scans, or stores digital photographs is practicing digital asset management (DAM), but few people do it in a way that makes sense. In this second edition, photographer Peter Krogh -- the leading expert on DAM -- provides new tools and techniques to help professionals, amateurs, and students: Understand the image file lifecycle: from shooting to editing, output, and permanent storage Learn new ways to use metadata and key words to track photo files Create a digital archive and name files clearly Determine a strategy for backing up and validating image data Learn a catalog workflow strategy, using Adobe Bridge, Camera Raw, Adobe Lightroom, Microsoft Expression Media, and Photoshop CS4 together Migrate images from one file format to another, from one storage medium to another, and from film to digital Learn how to copyright images To identify and protect your images in the marketplace, having a solid asset management system is essential. The DAM Book offers the best approach.

Refine Search

Showing 55,926 through 55,950 of 62,931 results