Browse Results

Showing 56,651 through 56,675 of 62,964 results

The Hackable City: Digital Media and Collaborative City-Making in the Network Society

by Michiel De Lange Martijn De Waal

This open access book presents a selection of the best contributions to the Digital Cities 9 Workshop held in Limerick in 2015, combining a number of the latest academic insights into new collaborative modes of city making that are firmly rooted in empirical findings about the actual practices of citizens, designers and policy makers. It explores the affordances of new media technologies for empowering citizens in the process of city making, relating examples of bottom-up or participatory practices to reflections about the changing roles of professional practitioners in the processes, as well as issues of governance and institutional policymaking.

The Hacked World Order: How Nations Fight, Trade, Maneuver, And Manipulate In The Digital Age

by Adam Segal

The internet today connects roughly 2. 7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked World Order, Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. Israel is intent on derailing the Iranian nuclear weapons program. India wants to prevent Pakistani terrorists from using their Blackberries to coordinate attacks. Brazil has plans to lay new fiber cables and develop satellite links so its Internet traffic no longer has to pass through Miami. China does not want to be dependent on the West for its technology needs. These new digital conflicts pose no physical threat--no one has ever died from a cyberattack--but they serve to both threaten and defend the integrity of complex systems like power grids, financial institutions, and security networks. Segal describes how cyberattacks can be launched by any country, individual, or private group with minimal resources in mere seconds, and why they have the potential to produce unintended and unimaginable problems for anyone with an internet connection and an email account. State-backed hacking initiatives can shut down, sabotage trade strategies, steal intellectual property, sow economic chaos, and paralyze whole countries. Diplomats, who used to work behind closed doors of foreign ministries, must now respond with greater speed, as almost instantaneously they can reach, educate, or offend millions with just 140 characters. Beginning with the Stuxnet virus launched by the US at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implication on our economic livelihood, security, and personal identity.

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

by Bruce Sterling

Father of "cyberpunk" science fiction and techno-journalist, Sterling writes in his popular style for this nonfiction book that looks at computer hacking from both sides of the law. He interviews outlaw hackers and phone phreaks, law enforcement personnel, and civil libertarians, and presents a look at the people involved in the world of cyberspace and the politics of the new technological world. No references. Annotation c. by Book News, Inc., Portland, OR.

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

by Bruce Sterling

The bestselling cyberpunk author &“has produced by far the most stylish report from the computer outlaw culture since Steven Levy&’s Hackers&” (Publishers Weekly). Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security. From the crash of AT&T&’s long-distance switching system to corporate cyberattacks, he investigates government and law enforcement efforts to break the back of America&’s electronic underground in the 1990s. In this modern classic, &“Sterling makes the hackers—who live in the ether between terminals under noms de net such as VaxCat—as vivid as Wyatt Earp and Doc Holliday. His book goes a long way towards explaining the emerging digital world and its ethos&” (Publishers Weekly). This edition features a new preface by the author that analyzes the sobering increase in computer crime over the twenty-five years since The Hacker Crackdown was first published. &“Offbeat and brilliant.&” —Booklist &“Thoroughly researched, this account of the government&’s crackdown on the nebulous but growing computer-underground provides a thoughtful report on the laws and rights being defined on the virtual frontier of cyberspace. . . . An enjoyable, informative, and (as the first mainstream treatment of the subject) potentially important book . . . Sterling is a fine and knowledgeable guide to this strange new world.&” —Kirkus Reviews &“A well-balanced look at this new group of civil libertarians. Written with humor and intelligence, this book is highly recommended.&” —Library Journal

The Hacker Playbook: Practical Guide to Penetration Testing

by Peter Kim

Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

by Dave Aitel Susan Young

The Hacker‘s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuv

The Hamster Revolution: How to Manage Your Email Before it Manages You

by Ken Blanchard Mike Song Vicki Halsey Tim Burress

The Hamster Revolution is a timely solution to both the widespread problem of email overload as well as most people's inefficient (or nonexistent) systems for categorizing and storing email messages.

The Handbook for Beginning Programmers with Examples in JavaScript, Third Edition

by Rex A. Barzee

Jammed full of hands on exercises and computer programming examples, this book will help you avoid frustration as you learn computer programming. From this book you will learn how to program a computer to perform calculations, make decisions, and repeat commands. You will learn how to organize your programs into functions and how to use arrays to store and process large amounts of data.

The Handbook of Ad Hoc Wireless Networks (Electrical Engineering Handbook)

by Mohammad Ilyas

A relative newcomer to the field of wireless communications, ad hoc networking is growing quickly, both in its importance and its applications. With rapid advances in hardware, software, and protocols, ad hoc networks are now coming of age, and the time has come to bring together into one reference their principles, technologies, and techniques.The Handbook of Ad Hoc Wireless Networks does exactly that. Experts from around the world have joined forces to create the definitive reference for the field. From the basic concepts, techniques, systems, and protocols of wireless communication to the particulars of ad hoc network routing methods, power, connections, traffic management, and security, this handbook covers virtually every aspect of ad hoc wireless networking. It includes a section that explores several routing methods and protocols directly related to implementing ad hoc networks in a variety of applications.The benefits of ad hoc wireless networks are many, but several challenges remain. Organized for easy reference, The Handbook of Ad Hoc Wireless Networks is your opportunity to gain quick familiarity with the state of the art, have at your disposal the only complete reference on the subject available, and prepare to meet the technological and implementation challenges you'll encounter in practice.

The Handbook of Applied Expert Systems

by Jay Liebowitz

The Handbook of Applied Expert Systems is a landmark work dedicated solely to this rapidly advancing area of study. Edited by Jay Liebowitz, a professor, author, and consultant known around the world for his work in the field, this authoritative source covers the latest expert system technologies, applications, methodologies, and practices. The book features contributions from more than 40 of the world's foremost expert systems authorities in industry, government, and academia.The Handbook is organized into two major sections. The first section explains expert systems technologies while the second section focuses on applied examples in a wide variety of industries. Key topics covered include fuzzy systems, genetic algorithm development, machine learning, knowledge representation, and much more.

The Handbook of Bird Photography

by Bence Mate Jari Peltomaki Markus Varesvuo

The Handbook of Bird Photography distills the knowledge, talent, and experience of three well-known professional wildlife photographers into one beautifully illustrated volume. Written in a manner that is easy to understand, this book offers fresh insight and practical tips that will broaden horizons for nature and bird photographers. The authors share their stories showcasing photographs for which they have received awards in major international wildlife photo competitions. In this book, you'll learn about all of the elements that lead to a great bird photograph, including:The bird photographer's equipment Shooting techniques: exposure, focus, how to show movement and freeze action, etc. In the field: bird behavior, hides, and how to attract birds How to use light and compose and crop images The best sites for finding and photographing birds You'll also learn how to show, share, promote, and sell your photographs. Bird photography is a brilliant way to spend your free time, and for some it's a career. This book helps beginners get the hang of things quickly and accurately, and offers field-specific expertise for more experienced photographers.

The Handbook of Formal Methods in Human-Computer Interaction

by Philippe Palanque Benjamin Weyers Judy Bowen Alan Dix

This book provides a comprehensive collection of methods and approaches for using formal methods within Human-Computer Interaction (HCI) research, the use of which is a prerequisite for usability and user-experience (UX) when engineering interactive systems. World-leading researchers present methods, tools and techniques to design and develop reliable interactive systems, offering an extensive discussion of the current state-of-the-art with case studies which highlight relevant scenarios and topics in HCI as well as presenting current trends and gaps in research and future opportunities and developments within this emerging field. The Handbook of Formal Methods in Human-Computer Interaction is intended for HCI researchers and engineers of interactive systems interested in facilitating formal methods into their research or practical work.

The Handbook of Homeland Security

by Scott N. Romaniuk Martin Scott Catino C. Augustus Martin

The Handbooks of Homeland Security Handbook is a convenient, one-stop reference and guide to the latest regulations and developments in all things relevant to the homeland security and defense domain. The book is divided into five parts and addresses such critical areas of as countering terrorism, critical infrastructure protection, information and cybersecurity, military and private sector support for Homeland Security, risk assessment, and preparedness for all-hazards and evolving threats. In total, more than 100 chapters outline the latest developments in homeland security policies, directives, and mandates as well as emergent threats and topical considerations for the Department of Homeland Security (DHS) and its stake-holders. The diverse array of chapter topics covered—contributed to by dozens of top experts in the field—provides a useful and important resource for any student, professional, researcher, policy-maker, or library in understanding the domestic initiatives of public-sector Homeland Security entities and their responsibilities in the current global environment.

The Handbook of Human-Machine Interaction: A Human-Centered Design Approach

by Guy A. Boy

The Handbook of Human-Machine Interaction features 20 original chapters and a conclusion focusing on human-machine interaction (HMI) from analysis, design and evaluation perspectives. It offers a comprehensive range of principles, methods, techniques and tools to provide the reader with a clear knowledge of the current academic and industry practice and debate that define the field. The text considers physical, cognitive, social and emotional aspects and is illustrated by key application domains such as aerospace, automotive, medicine and defence. Above all, this volume is designed as a research guide that will both inform readers on the basics of human-machine interaction from academic and industrial perspectives and also provide a view ahead at the means through which human-centered designers, including engineers and human factors specialists, will attempt to design and develop human-machine systems.

The Handbook of MPEG Applications: Standards in Practice

by Marios C. Angelides Harry Agius

This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application. In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A, focusing not only on the standards themselves, but specifically upon their application (e.g. for broadcasting media, personalised advertising and news, multimedia collaboration, digital rights management, resource adaptation, digital home systems, and so on); including MPEG cross-breed applications. In the evolving digital multimedia landscape, this book provides comprehensive coverage of the key MPEG standards used for generation and storage, distribution and dissemination, and delivery of multimedia data to various platforms within a wide variety of application domains. It considers how these MPEG standards may be used, the context of their use, and how supporting and complementary technologies and the standards interact and add value to each other. Key Features: Integrates the application of five popular MPEG standards (MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A) into one single volume, including MPEG cross-breed applications Up-to-date coverage of the field based on the latest versions of the five MPEG standards Opening chapter provides overviews of each of the five MPEG standards Contributions from leading MPEG experts worldwide Includes an accompanying website with supporting material (www.wiley.com/go/angelides_mpeg) This book provides an invaluable reference for researchers, practitioners, CTOs, design engineers, and developers. Postgraduate students taking MSc, MRes, MPhil and PhD courses in computer science and engineering, IT consultants, and system developers in the telecoms, broadcasting and publishing sectors will also find this book of interest.

The Handbook of Mobile Middleware

by Paolo Bellavista Antonio Corradi

Device miniaturization, wireless computing, and mobile communication are driving ubiquitous, pervasive, and transparent computing. Supporting these rapidly evolving technologies requires middleware solutions that address connectivity-level, location-dependent, and context-dependent issues.The Handbook of Mobile Middleware is an exhaustive o

The Handbook of Personal Area Networking Technologies and Protocols

by Dean Anthony Gratton

This handbook offers an unparalleled view of wireless personal area networking technologies and their associated protocols. It lifts the lid on their growing adoption within the consumer electronics, home automation, sports, health and well-being markets. Bluetooth low energy, ZigBee, EnOcean and ANT+ are comprehensively covered, along with other WPAN technologies including NFC, Wi-Fi, Bluetooth classic and high speed, and WHDI. It also features 802. 11ac, the Internet of Things, Wireless USB, WiGig and WirelessHD. The handbook shows how white space radio, cellular and Femtocells have inadvertently blurred the boundaries between personal and wide area communications, creating disruptive topologies through technology convergence. It explores how pervasive WAN technologies have spawned a new generation of consumers through the Lawnmower Man Effect and explains how our personal space has become integral to social media streams, including Twitter, Facebook and Pinterest. An essential read for students, software engineers and developers, product planners, technical marketers and analysts.

The Handbook of Surface Imaging and Visualization

by Arthur T. Hubbard

This exciting new handbook investigates the characterization of surfaces. It emphasizes experimental techniques for imaging of solid surfaces and theoretical strategies for visualization of surfaces, areas in which rapid progress is currently being made. This comprehensive, unique volume is the ideal reference for researchers needing quick access to the latest developments in the field and an excellent introduction to students who want to acquaint themselves with the behavior of electrons, atoms, molecules, and thin-films at surfaces. It's all here, under one cover!The Handbook of Surface Imaging and Visualization is filled with sixty-four of the most powerful techniques for characterization of surfaces and interfaces in the material sciences, medicine, biology, geology, chemistry, and physics. Each discussion is easy to understand, succinct, yet incredibly informative. Data illustrate present research in each area of study. A wide variety of the latest experimental and theoretical approaches are included with both practical and fundamental objectives in mind. Key references are included for the reader's convenience for locating the most recent and useful work on each topic. Readers are encouraged to contact the authors or consult the references for additional information.This is the best ready reference available today. It is a perfect source book or supplemental text on the subject.

The Handmade Marketplace, 2nd Edition: How to Sell Your Crafts Locally, Globally, and Online

by Kari Chapin

Make money doing what you love. Kari Chapin’s insightful and inspiring guide to turning your crafting skills into earned income has been completely revised and updated. The Handmade Marketplace is filled with proven techniques that can help you brand your business, establish a client base, sell your products, and effectively employ all aspects of social media. Learn how easy it is to enjoy a lucrative career while leading the creative life you’ve always craved.

The Handover: How We Gave Control of Our Lives to Corporations, States and AIs

by David Runciman

“[W]itty and refined . . . Runciman’s point is that the alliance between even a democratic government and a safe-ish A.I. could derail civilization.” —Gideon Lewis-Kraus, New Yorker An eminent political thinker uses our history with states and corporations—“artificial agents” to which we have granted immense power—to predict how AI will remake society. Countless books, news reports, and opinion pieces have announced the impending arrival of artificial intelligence, with most claiming that it will upend our world, revolutionizing not just work but society overall. Yet according to political philosopher and historian David Runciman, we’ve actually been living with a version of AI for 300 years because states and corporations are robots, too. In The Handover, Runciman explains our current situation through the history of these “artificial agents” we created to rescue us from our all-too-human limitations—and demonstrates what this radical new view of our recent past means for our collective future. From the United States and the United Kingdom to the East India Company, Standard Oil, Facebook, and Alibaba, states and corporations have gradually, and then much more rapidly, taken over the planet. They have helped to conquer poverty and eliminate disease, but also unleashed global wars and environmental degradation. As Runciman demonstrates, states and corporations are the ultimate decision-making machines, defined by their ability to make their own choices and, crucially, to sustain the consequences of what has been chosen. And if the rapid spread of the modern state and corporation has already transformed the conditions of human existence, new AI technology promises the same. But what happens when AI interacts with other kinds of artificial agents, the inhuman kind represented by states and corporations? Runciman argues that the twenty-first century will be defined by increasingly intense battles between state and corporate power for the fruits of the AI revolution. In the end, it is not our own, human relationship with AI that will determine our future. Rather, humanity’s fate will be shaped by the interactions among states, corporations, and thinking machines. With clarity and verve, The Handover presents a brilliantly original history of the last three centuries and a new understanding of the immense challenges we now face.

The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery

by Richard M. Kesner

Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious thought as to how process improvements could lead to higher performance and customer satisfaction. This volume offers processes, techniques, and tools that IT managers can use to improve the delivery of IT products and services. This compendium details simple frameworks, practical tools, and proven best practices for successful IT project management. By explaining how to streamline the functions that capture and report information about IT delivery, the author clarifies roles, responsibilities, customer expectations, and performance measures, resulting in improved service and efficiency. Emphasizing the establishment of processes that result in repeatable success, the book provides quickly implementable solutions for IT personnel faced with the daily management of large, complex systems.

The Happiness Effect: How Social Media is Driving a Generation to Appear Perfect at Any Cost

by Donna Freitas Christian Smith

Sexting. Cyberbullying. Narcissism. Social media has become the dominant force in young people's lives, and each day seems to bring another shocking tale of private pictures getting into the wrong hands, or a lament that young people feel compelled to share their each and every thought with the entire world. Have smartphones and social media created a generation of self-obsessed egomaniacs? <p>Absolutely not, Donna Freitas argues in this provocative book. And, she says, these alarmist fears are drawing attention away from the real issues that young adults are facing.

The Hardware Hacker Adventures in Making and Breaking Hardware

by Andrew Bunnie" Huang

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective. Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs. Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware. With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

by Colin O'Flynn Jasper van Woudenberg

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they&’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you&’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you&’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony&’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You&’ll learn: • How to model security threats, using attacker profiles, assets, objectives, and countermeasures • Electrical basics that will help you understand communication interfaces, signaling, and measurement • How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips • How to use timing and power analysis attacks to extract passwords and cryptographic keys • Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualizationWhether you&’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you&’ll always want to have onhand.

The Haskell School of Expression

by Paul Hudak

Functional programming is a style of programming that emphasizes the use of functions (in contrast to object-oriented programming, which emphasizes the use of objects). It has become popular in recent years because of its simplicity, conciseness, and clarity. This book, first published in 2000, teaches functional programming as a way of thinking and problem solving, using Haskell, the most popular purely functional language. Rather than using the conventional (boring) mathematical examples commonly found in other programming language textbooks, the author uses examples drawn from multimedia applications, including graphics, animation, and computer music, thus rewarding the reader with working programs for inherently more interesting applications. Aimed at both beginning and advanced programmers, this tutorial begins with a gentle introduction to functional programming and moves rapidly on to more advanced topics. Details about progamming in Haskell are presented in boxes throughout the text so they can be easily found and referred to.

Refine Search

Showing 56,651 through 56,675 of 62,964 results