Browse Results

Showing 56,851 through 56,875 of 61,466 results

The Zero Trust Framework and Privileged Access Management (PAM)

by Ravindra Das

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure.However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

by Ravindra Das

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

The Zimbabwean Crisis after Mugabe: Multidisciplinary Perspectives (Routledge Contemporary Africa)

by Tendai Mangena

This book examines the ways in which political discourses of crisis and ‘newness’ are (re)produced, circulated, naturalised, received and contested in Post-Mugabe Zimbabwe. Going beyond the ordinariness of conventional political, human and social science methods, the book offers new and engaging multi-disciplinary approaches that treat discourse and language as important sites to encounter the politics of contested representations of the Zimbabwean crisis in the wake of the 2017 coup. The book centres discourse on new approaches to contestations around the discursive framing of various aspects of the socio-economic and political crisis related to significant political changes in Zimbabwe post-2017. Contributors in this volume, most of whom experienced the complex transition first-hand, examine some of the ways in which language functions as a socio-cultural and political mechanism for creating imaginaries, circulating, defending and contesting conceptions, visions, perceptions and knowledges of the post-Mugabe turn in the Zimbabwean crisis and its management by the "New Dispensation". This book will be of interest to scholars of African studies, postcolonial studies, language/discourse studies, African politics and culture.

The basics that every web developer needs to know

by Marcelo Galhego

Every journey has a beginning, and I believe that if you are looking to become a web developer but don't know how and where to start, this book can be your first step on this fantastic journey. I hope this book will help you reach your goals and make your dreams come true.

The e-Policy Handbook: Rules And Best Practices To Safely Manage Your Company's E-mail, Blogs, Social Networking, And Other Electronic Communication Tools

by Nancy FLYNN

Trillions of e-mails travel each year through corporate networks—and they're not all work-related. But for organizations wishing to protect themselves from liability, e-mail is no longer the only danger—they now have to contend with blogs, social networking sites, and other new technologies. Packed with electronic rules, step-by-step guidelines, sample policies, and e-disaster stories, this revised edition of The e-Policy Handbook helps readers: implement strategic electronic rules • prevent security breaches and data theft • safeguard confidential company and customer information • manage new and emerging technologies • write and implement effective policies • train employees. Updated to cover new technologies, including instant messaging, social networking, text messaging, video sites, and more, this is a comprehensive resource for developing clear, complete e-policies.

The e-Revolution and Post-Compulsory Education: Using e-Business Models to Deliver Quality Education

by Peter Ford Jos Boys

Moving debates about ICT and higher education beyond a simple focus on e-learning, this book takes into consideration the provision of post-secondary education as a whole.Discussing what is meant by e-business, why e-business approaches are relevant to universities and colleges and the key issues this raises for post-secondary education, this book:examines emerging technologies and provides examples of what an e-institution for education might look like explores what can be learnt from e-business in re-defining the relationships between enterprises and their users and in developing processes to improve services and competitive advantage considers how to improve administrative efficiency, implement faster access and response to information, enhance skills and knowledge development and improve the student experience examines technological innovation and integration, leadership styles, risk assessment and cost-benefit type analyses, re-designing existing organisational frameworks, techniques for overcoming barriers to change and successfully implementing change and the types of technologies required for an e-integrated educational provision In a highly competitive educational marketplace, institutions need to react to and embrace new technologies to provide rich and competitive learning environments for the students of tomorrow. The discussion and guidance in this book is essential reading for all leaders, managers and heads of e-learning in higher and further education.

The gm/ID Methodology, a sizing tool for low-voltage analog CMOS Circuits

by Paul Jespers

IC designers appraise currently MOS transistor geometries and currents to compromise objectives like gain-bandwidth, slew-rate, dynamic range, noise, non-linear distortion, etc. Making optimal choices is a difficult task. How to minimize for instance the power consumption of an operational amplifier without too much penalty regarding area while keeping the gain-bandwidth unaffected in the same time? Moderate inversion yields high gains, but the concomitant area increase adds parasitics that restrict bandwidth. Which methodology to use in order to come across the best compromise(s)? Is synthesis a mixture of design experience combined with cut and tries or is it a constrained multivariate optimization problem, or a mixture? Optimization algorithms are attractive from a system perspective of course, but what about low-voltage low-power circuits, requiring a more physical approach? The connections amid transistor physics and circuits are intricate and their interactions not always easy to describe in terms of existing software packages. The gm/ID synthesis methodology is adapted to CMOS analog circuits for the transconductance over drain current ratio combines most of the ingredients needed in order to determine transistors sizes and DC currents.

The iConnected Parent

by Barbara K. Hofer Abigail Sullivan Moore

"Just let go!" That's what parents have been told to do when their kids go to college. But in our speed-dial culture, with BlackBerries and even Skype, parents and kids are now more than ever in constant contact. Today's iConnected parents say they are closer to their kids than their parents were to them--and this generation of families prefers it that way. Parents are their children's mentors, confidants, and friends--but is this good for the kids? Are parents really letting go--and does that matter?Dr. Barbara Hofer, a Middlebury College professor of psychology, and Abigail Sullivan Moore, a journalist who has reported on college and high school trends for the New York Times, answer these questions and more in their groundbreaking, compelling account of both the good and the bad of close communication in the college years and beyond. An essential assessment of the state of parent-child relationships in an age of instant communication, The iConnected Parent goes beyond sounding the alarm about the ways many young adults are failing to develop independence to describe the healthy, mutually fulfilling relationships that can emerge when families grow closer in our wired world.Communicating an average of thirteen times a week, parents and their college-age kids are having a hard time letting go. Hofer's research and Moore's extensive reporting reveal how this trend is shaping families, schools, and workplaces, and the challenge it poses for students with mental health and learning issues. Until recently, students handled college on their own, learning life's lessons and growing up in the process. Now, many students turn to their parents for instant answers to everyday questions. "My roommate's boyfriend is here all the time and I have no privacy! What should I do?" "Can you edit my paper tonight? It's due tomorrow." "What setting should I use to wash my jeans?" And Mom and Dad are not just the Google and Wikipedia for overcoming daily pitfalls; Hofer and Moore have discovered that some parents get involved in unprecedented ways, phoning professors and classmates, choosing their child's courses, and even crossing the lines set by university honor codes with the academic help they provide. Hofer and Moore offer practical advice, from the years before college through the years after graduation, on how parents can stay connected to their kids while giving them the space they need to become independent adults.Cell phones and laptops don't come with parenting instructions. The iConnected Parent is an invaluable guide for any parent with a child heading to or already on campus.

The iPad for Artists: How to Make Great Art with the Digital Tablet

by Dani Jones

Enabling new and exisiting iPad users to develop and stretch their artistry in the digital age.

The iPad for Photographers: A Guide To Managing, Editing And Displaying Photographs Using Your Ipad

by Ben Harvell

Think the little LCD on the back of your camera is useful? You haven't seen anything yet. This book will show you how to put photography's new essential piece of kit at the centre of your workflow, enabling you to bridge the gap between the camera and the internet by importing and uploading photos to the cloud, edit images on the road with the latest and most powerful apps, and organise and design your portfolio in a sleek and stylish package that will impress clients and present your work at its best. Novice or pro, the photographic uses of your iPad are endless, and this guide gives you everything you need to take full advantage of this powerful tool's capabilities. Fully updated for the latest apps, retina screen, iPad mini, and iOS 6. Catch up or get left behind - fluency with an iPad is now an industry standard. A must-read for iPad-owning digital photographers everywhere.

The iPhone App Design Manual

by Dave Brown

App creation is now a huge, global business, with hundreds of thousands of developers, entrepreneurs, and companies attracted by the potential rewards. But games, functional apps, and promotional apps alike depend on attractive, intuitive design for their appeal, and most fail to find a significant audience. With this book, you'll be able to turn your great app idea into a functioning design ready for coding, or apply graphic design skills to this exciting new field, and create an app that will stand out in a market that is worth over a billion dollars every year. Understand the design process that underlies the best and most successful apps Learn how to create a friendly interface and smooth user experience, and avoid the pitfalls that plague first-time designers Master the tricks of the trade that make apps stand out: effective visuals, punchy copy, and attractive colors

The iPhone App Design Manual: Create Perfect Designs for Effortless Coding and App Store Success

by Dave Brown Vicky Roberts

The creation of apps for Apple's iPhone is now a huge, and global business, with hundreds of thousands of developers, entrepreneurs and companies attracted by the potential rewards. But games, functional apps and promotional apps alike depend on attractive, intuitive design for their appeal, and most fail to find a significant audience.With this book, you'll be able to turn your great app idea into a functioning design that is ready for coding, or apply graphic design skills to this exciting and lucrative marketplace. You will have a clearly visualised concept and a focused sales plan - and your app will stand out in an App Store that is worth well over a billion pounds every year.

The iPhone Manual - Tips and Hacks: A complete user guide to getting the best out of your iPhone and iOS 14

by Wallace Wang

Discover customization and productivity tips with this quick guide for iPhone usersKey FeaturesLearn everything about your iPhone quickly to use it as an effective tool for communication, entertainment, and workCustomize your phone's look and sound and modify the iOS's privacy settingsKeep your apps tidy and organized using the App LibraryBook DescriptionThe iPhone is the most popular smartphone available on the market, renowned for its sophisticated design, immersive UI, and user safety. And even if you've bought an iPhone for its impressive specifications, you may still be unaware of many of its features, which you'll discover with the help of this book!The iPhone Manual is your practical guide to uncovering the hidden potential of iPhones, and will leave you amazed at how productive you can be by learning tips and hacks for customizing your device as a communication, entertainment, and work tool. You'll unearth the complete range of iPhone features and customize it to streamline your day-to-day interaction with your device. This iPhone manual will help you explore your iPhone's impressive capabilities and fully understand all the features, functions, and settings that every iPhone owner should know. With this book, you'll get to grips with not only the basics of communication but also best practices for accessing photos, videos, and music to set up your entertainment using your iPhone. In addition to this, you'll learn about serious work tools that will make you productive in your everyday tasks.By the end of this iPhone book, you'll have learned how to use your iPhone to perform tasks and customize your experience in ways you probably didn't realize were possible.What you will learnUse touch gestures and understand the user interface to use any app on the iPhoneExplore the latest apps exclusive to iOS 14, such as the translate and magnifier appsFind out how to share data from your iPhone with other devicesSet up and customize Siri and learn how to give commandsDiscover different ways to capture and access pictures and videosSet up an email account and use multiple accounts on a single deviceSet up FaceTime on your iPhone and discover different ways to make a FaceTime callUse Apple Pay to shop online or send money to other usersWho this book is forThe book is for iPhone users who want to get more out of their state-of-the-art iPhone device and the powerful iOS interface. If you are new to using smartphones or are an Android user new to iPhones, this book will help you migrate efficiently.

The iPhone Photographer

by Michael Fagans

The iPhone camera is a sophisticated device. It has compelled millions of people worldwide to take a new or renewed interest in photography. Let’s face it: most of us now have a tiny yet highly competent camera in a pocket or purse at all times these days, and we use it to grab shots of people, places, and things more and more often as the technology improves-and you know what? We’re largely pleased with those captures. If you’re a SERIOUS photographer, you may be wondering just how much mileage you can get out of your "simple,” ever-ready iPhone camera. Well, the answer may surprise you. In this book, Michael Fagans deconstructs photos taken in 60 scenarios-with a diverse array of subjects, in changing lighting conditions, in places that present unique challenges-showing you how to use solid, traditional photographic techniques to create great shots. Yes, Fagans will teach you the basics of creating a great photo. But there’s far more: He’ll show you that an iPhone, with the aid of apps, can mimic looks achieved by vintage cameras, a range of lenses, and countless filters. In this book, Fagans teaches you how to use free and low-cost apps and Instagram options to create (or, rather, re-create) beloved vintage-photo effects that you’d achieve with the Holga (a plastic vintage camera known for its unexpected lens distortion) and medium-format-camera looks. You’ll learn how to choose and use digital lenses, filters, and effects-and combine and re-combine them-to intensify color and contrast, de-saturate color, introduce lens aberrations, play with the grain and color cast in the image, and much, much more. What to emulate the look of vintage film stock to create a photo with an aged, time-worn feel? No problem. Want to introduce a little focusing inaccuracy for effect? Easily done. Want to do these things AND use traditional, professional artificial lighting sources (think a large softbox), a professional image-editing platform (Photoshop), and really refine your message while pulling out all the stops? Fagans shows you how. The deconstruction of the images in this book makes it worth the price of admission. Still, however, there is far more: Fagans is a photographer’s photographer. The book is peppered with inspiring quotes from Ansel Adams, Minor White, and countless other photographic visionaries that speak to the heart of photography.

The keys of success for MLM: The keys of success

by Vicente Cuenca

"There is no riskier thing than not to take risk" A year ago, I was interviewing Mr. Francisco Javier Lopez Navarro, founding president of the international institute of Self- Employment. He is a successful entrepreneur, yet he wanted to know to improve his work. I was very surprised that this man came to me, since his company

The macOS User Administration Guide

by Herta Nava

Explore the capabilities of macOS tools and architecture for support tasks and system administration to optimize your macOS environmentKey FeaturesDelve into macOS Big Sur, from installation to managing apps and optimizing your environmentGet to grips with system administration, along with monitoring, maintaining, and securing your systemsDiscover ways to secure your data, backup infrastructure, and explore hidden files and foldersBook DescriptionThis book is a practical guide for developers looking to understand the features and tools in macOS that make it a professional tool for system administration.You will understand the basics of system administration and later get up and running with monitoring, maintaining, and securing your systems. With practical examples and best practices, you will be able to build a backup infrastructure and virtual private network for your network. As you progress, you will understand how to secure your data and networks effectively by implementing various security strategies.By the end of this book, you’ll not only be well-versed with macOS features, administration tasks, and best practices but also be able to apply the concepts you learn to achieve professional Apple certifications such as Apple Certified Support Professional (ACSP).What you will learnUnderstand the fundamentals of the macOS system and architectureInstall, update, and configure your local macOS system and identify the stages of the startup processCreate and manage a local user account and set up your customized macOS environmentManage your file systems, storage, and permissionsExplore practices and techniques to work with apps, networks, and security for your Mac systemDelve into administration tasks such as managing service resources and peripherals Who This Book Is ForIf you are a system administrator, support and help desk technician or engineer, power user, or Mac user looking to develop your knowledge of macOS, then this system administration book is for you. The book assumes a general understanding of the macOS environment. Some knowledge of system administration tasks will be beneficial, but not mandatory.Table of ContentsOverview of the macOS system, architecture, and featuresInstalling and configuring macOSThe Startup ProcessUser Accounts ManagementManaging User Security and PrivacyThe macOS File System: Disks, Volumes, and PartitionsUnderstanding Ownership and PermissionsSystem Resources and ShortcutsUnderstanding Metadata and SearchingManaging Apps and DocumentsBackups and ArchivingNetworking in macOSUsing the Command LineUsing macOS Sharing ServicesManaging Security in macOSUsing the Command-LineAPPENDIX A: Troubleshooting Tips

The new iPad Portable Genius

by Paul Mcfedries

Essential coverage of everything you need to know about The new iPadThe popularity of the iPad is seemingly unstoppable and if you've decided to get in the iPad game, this handy guide is must-have reading. This easy-to-understand resource shares tips, tricks, and advice, to help you get the most out of your ultraportable tablet device. You'll learn how to maximize features of The new iPad such as the beautiful Retina display, multitouch screen, 5MP camera, Bluetooth and Wi-Fi +4G capability, eReader functionality, and much more.Shows you how to surf the web, watch movies and TV, listen to music, read books, play games, create presentations, edit documents, manage contacts, organize photos, update spreadsheets, and more Covers how to use and troubleshoot the latest iOS Features Genius icons to show you the smartest way to do things Helps save you time and avoid hassles as you get up to speed The new iPad Portable Genius presents you with accessible, useful information so that you can start confidently using your new iPad today!

The “Hand-eye-brain” System of Intelligent Robot: From Interdisciplinary Perspective of Information Science and Neuroscience (Research on Intelligent Manufacturing)

by Chao Ma Rui Li Hong Qiao

This book reports the new results of intelligent robot with hand-eye-brain, from the interdisciplinary perspective of information science and neuroscience. It collects novel research ideas on attractive region in environment (ARIE), intrinsic variable preserving manifold learning (IVPML) and biologically inspired visual congnition, which are theoretically important but challenging to develop the intelligent robot. Furthermore, the book offers new thoughts on the possible future development of human-inspired robotics, with vivid illustrations. The book is useful for researchers, R&D engineers and graduate students working on intelligent robots.

The “Socialist Transformation” of Memory: Reversing Chinese History through “Pernicious-Vestiges” Media Discourse (China Perspectives)

by Yusi Liu Ye Ma

Through discourse analysis and historical comparison of "Pernicious Vestiges" (Yí Dú/遗毒) narrative in the news text of People’s Daily, this book is devoted to revealing its primary metaphors and political functions in China. "Pernicious Vestiges" (Yí Dú/遗毒) is one of the most frequently used words in contemporary Chinese historical narration, as well as a constantly changing rhetorical direction in new China's media discourse, whose function is to remold memory. Over the past 76 years, the "Pernicious Vestiges" narrative continuously constructed by People’s Daily, the official newspaper of the CPC Central Committee, reflects the views of China’s political elite and represents the ruling party's evaluation and re-evaluation of historical events. The findings of this book challenge the myth that memory is naturally superior to forgetting, reflect on the ethics of memory in "Pernicious Vestiges" narratives and the erasure of their own justice, and suggest that the critical space compressed by "Pernicious Vestiges" narratives should be returned to restore the order of memory and historical reflection. This book will be an excellent read for students and scholars of Chinese studies, media studies, and those who are interested in political communication and collective memory in general.

Theorems for Electrical Circuits: Theory and Solved Problems (Lecture Notes in Electrical Engineering #485)

by Alfonso Bachiller Soler Miguel Angel González Cagigal Ramón Cano González

This book focuses on the practical application of specific theorems in solving electrical circuits. Specifically, it covers the theorems of Superposition, Thevenin, Norton, and Maximum Power Transfer. The theory is kept concise, yet all the necessary concepts are explained, and plentiful problems are solved in detail. A vast amount of figures is used for a more effective learning. All in all, this book helps undergraduate and graduate students to develop the necessary skills to solve a broad range of transient exercises. It offers a unique complementary text to classical electric circuit textbooks, for students and self-study, as well.

Theoremus: A Student's Guide to Mathematical Proofs

by Lito Perez Cruz

A compact and easily accessible book, it guides the reader in unravelling the apparent mysteries found in doing mathematical proofs. Simply written, it introduces the art and science of proving mathematical theorems and propositions and equips students with the skill required to tackle the task of proving mathematical assertions. Theoremus - A Student's Guide to Mathematical Proofs is divided into two parts. Part 1 provides a grounding in the notion of mathematical assertions, arguments and fallacies and Part 2, presents lessons learned in action by applying them into the study of logic itself. The book supplies plenty of examples and figures, gives some historical background on personalities that gave rise to the topic and provides reflective problems to try and solve. The author aims to provide the reader with the confidence to take a deep dive into some more advanced work in mathematics or logic.

Theoretical Aspects of Computing - ICTAC 2015

by Martin Leucker Camilo Rueda Frank D. Valencia

This book constitutes the refereed proceedings of the12th International Colloquium on Theoretical Aspects of Computing, ICTAC 2015,held in Cali, Colombia, in October 2015. The 25 revised full papers presented togetherwith 7 invited talks, 3 tool papers, and 2 short papers were carefully reviewedand selected from 93 submissions. The papers cover various topics such asalgebra and category theory; automata and formal languages; concurrency;constraints, logic and semantic; software architecture and component-baseddesign; and verification.

Theoretical Aspects of Computing – ICTAC 2016

by Augusto Sampaio Farn Wang

This book constitutes the refereed proceedings of the 13th International Colloquium on Theoretical Aspects of Computing, ICTAC 2016, held in Taipei, Taiwan, in October 2016. The 23 revised full papers presented together with two short papers, two invited papers and one abstract of an invited paper were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on program verification; design, synthesis and testing; calculi; specifications; composition and transformation; automata; temporal logics; tool and short papers.

Theoretical Aspects of Computing – ICTAC 2019: 16th International Colloquium, Hammamet, Tunisia, October 31 – November 4, 2019, Proceedings (Lecture Notes in Computer Science #11884)

by Mohamed Mosbah Robert Mark Hierons

This book constitutes the refereed proceedings of the 16th International Colloquium on Theoretical Aspects of Computing, ICTAC 2019, held in Hammamet, Tunisia, in October/November 2019.The 17 revised full papers presented together with 2 keynote papers and 1 industrial paper were carefully reviewed and selected from 138 submissions.The papers are grouped in topical sections on models and transition systems; real-time and temporal logics; verification and concurrency; privacy and security; equations, types, and programming languages.

Theoretical Aspects of Computing – ICTAC 2020: 17th International Colloquium, Macau, China, November 30 – December 4, 2020, Proceedings (Lecture Notes in Computer Science #12545)

by Volker Stolz Violet Ka I Pun Adenilso Simao

This book constitutes the proceedings of the 17th International Colloquium on Theoretical Aspects of Computing, ICTAC 2020, which took place during November 30-December 4, 2020. The conference was originally planned to take place in Macau, China, but changed to a virtual only format due to the COVID-19 pandemic. The 15 papers presented in this volume were carefully reviewed and selected from 40 submissions. The book also contains one invited talk in full paper length. The book deals with challenges in both theoretical aspects of computing and the exploitation of theory through methods and tools for system development.

Refine Search

Showing 56,851 through 56,875 of 61,466 results