Browse Results

Showing 57,051 through 57,075 of 61,781 results

The Visual Organization

by Phil Simon

The era of Big Data as arrived, and most organizations are woefully unprepared. Slowly, many are discovering that stalwarts like Excel spreadsheets, KPIs, standard reports, and even traditional business intelligence tools aren't sufficient. These old standbys can't begin to handle today's increasing streams, volumes, and types of data. Amidst all of the chaos, though, a new type of organization is emerging. In The Visual Organization, award-winning author and technology expert Phil Simon looks at how an increasingly number of organizations are embracing new dataviz tools and, more important, a new mind-set based upon data discovery and exploration. Simon adroitly shows how Amazon, Apple, Facebook, Google, Twitter, and other tech heavyweights use powerful data visualization tools to garner fascinating insights into their businesses. But make no mistake: these companies are hardly alone. Organizations of all types, industries, sizes are representing their data in new and amazing ways. As a result, they are asking better questions and making better business decisions.Rife with real-world examples and case studies, The Visual Organization is a full-color tour-de-force.

The Vogue of Managing People in Workplace (Innovations in Sustainable Technologies and Computing)

by Nilanjan Dey Soumi Majumder

This book provides a detailed vogue picture of workforce management. Nowadays, the methodology of people management has been more advanced and dynamic; it becomes highly competitive. Keeping in mind the significance of economic and social development of the country, the author has tried to draw attention on innovative and creative practices of workforce retention in business. The book provides an idea on the way of merchandising with people, cultural dynamics with impacted leadership, investment in people for organizational transformation and the future of people management with artificial intelligence.

The Voice Catchers: How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet

by Joseph Turow

Your voice as biometric data, and how marketers are using it to manipulate you Only three decades ago, it was inconceivable that virtually entire populations would be carrying around wireless phones wherever they went, or that peoples&’ exact locations could be tracked by those devices. We now take both for granted. Even just a decade ago the idea that individuals&’ voices could be used to identify and draw inferences about them as they shopped or interacted with retailers seemed like something out of a science fiction novel. Yet a new business sector is emerging to do exactly that. The first in-depth examination of the voice intelligence industry, The Voice Catchers exposes how artificial intelligence is enabling personalized marketing and discrimination through voice analysis. Amazon and Google have numerous patents pertaining to voice profiling, and even now their smart speakers are extracting and using voice prints for identification and more. Customer service centers are already approaching every caller based on what they conclude a caller&’s voice reveals about that person&’s emotions, sentiments, and personality, often in real time. In fact, many scientists believe that a person&’s weight, height, age, and race, not to mention any illnesses they may have, can also be identified from the sound of that individual&’s voice. Ultimately not only marketers, but also politicians and governments, may use voice profiling to infer personal characteristics for selfish interests and not for the benefit of a citizen or of society as a whole. Leading communications scholar Joseph Turow places the voice intelligence industry in historical perspective, explores its contemporary developments, and offers a clarion call for regulating this rising surveillance regime.

The Volunteering Journey to Project Leadership: A Pathway to Improving Leadership Skills, Broadening Networks, and Exploring New Fields

by Mayte Mata Sivera Yasmina Khelifi

The project management profession has grown through the hard work of many volunteer groups and organizations. The Volunteering Journey to Project Leadership explains how volunteering can help project management professionals grow their own capabilities and careers. It explains how volunteering in project-oriented organizations, or any organization where projects are delivered, can help project managers develop leadership skills, build strong and diverse networks, and gain experiences in new fields. Any project manager or PMO can get advice and insights from this book, which explains how to: Identify volunteering goals that align with career goals Find the right organization that complements professional aspiration Choose activities for enhancing careers in project leadership Strategically select the right role to advance careers Based on the authors’ own volunteering and professional experiences, as well as interviews and informal discussion with more than 100 volunteers, this book is a hands-on guide to personal and professional growth in the field of project management. It is structured in three parts. Part I describes four ways volunteering can develop project leadership abilities. Part II focuses on leadership and adaptative skills, networking, and new skills gained by experimenting. Part III consolidates the learning and explains how to apply it at work. Each chapter ends with practical case studies, detailed interviews, key takeaways, and questions to reflect on.

The VueScan Bible

by Sascha Steinhoff

VueScan is the world's most widely used software interface for digitizing film and prints on flatbed and film scanners. This powerful yet affordable program supports over 1500 scanners and 321 digital camera RAW file types, and is available for Mac OS X, Windows, and Linux. Much more than a simple scanner program, VueScan allows you to perform functions such as color restoration, adding sharpening filters, adjusting white balance, rotating images, and batch scanning multiple images. It also provides output to a variety of formats including TIFF, JPEG, and searchable PDF files (even all three simultaneously). The Pro version outputs to the RAW format and provides options for color adjustments, and more. Despite its popularity, the documentation for VueScan does not provide enough information to use the full power of the system and makes it difficult to get started. The VueScan Bible is the missing manual for new, experienced, and prospective users of VueScan.

The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

by Benjamin Strout

Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your workKey FeaturesBuild successful strategies for planning and executing zero-day vulnerability researchFind the best ways to disclose vulnerabilities while avoiding vendor conflictLearn to navigate the complicated CVE publishing process to receive credit for your researchBook DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with the adoption and use of technology. To begin your journey of becoming a security researcher, you need more than just the technical skills to find vulnerabilities; you'll need to learn how to adopt research strategies and navigate the complex and frustrating process of sharing your findings. This book provides an easy-to-follow approach that will help you understand the process of discovering, disclosing, and publishing your first zero-day vulnerability through a collection of examples and an in-depth review of the process.You'll begin by learning the fundamentals of vulnerabilities, exploits, and what makes something a zero-day vulnerability. Then, you'll take a deep dive into the details of planning winning research strategies, navigating the complexities of vulnerability disclosure, and publishing your research with sometimes-less-than-receptive vendors.By the end of the book, you'll be well versed in how researchers discover, disclose, and publish vulnerabilities, navigate complex vendor relationships, receive credit for their work, and ultimately protect users from exploitation. With this knowledge, you'll be prepared to conduct your own research and publish vulnerabilities.What you will learnFind out what zero-day vulnerabilities are and why it's so important to disclose and publish themLearn how vulnerabilities get discovered and published to vulnerability scanning toolsExplore successful strategies for starting and executing vulnerability researchDiscover ways to disclose zero-day vulnerabilities responsiblyPopulate zero-day security findings into the CVE databasesNavigate and resolve conflicts with hostile vendorsPublish findings and receive professional credit for your workWho this book is forThis book is for security analysts, researchers, penetration testers, software developers, IT engineers, and anyone who wants to learn how vulnerabilities are found and then disclosed to the public. You'll need intermediate knowledge of operating systems, software, and interconnected systems before you get started. No prior experience with zero-day vulnerabilities is needed, but some exposure to vulnerability scanners and penetration testing tools will help accelerate your journey to publishing your first vulnerability.

The War Against the BBC: How an Unprecedented Combination of Hostile Forces Is Destroying Britain's Greatest Cultural Institution... And Why You Should Care

by Patrick Barwise Peter York

There's a war on against the BBC. It is under threat as never before. And if we lose it, we won't get it back.The BBC is our most important cultural institution, our best-value entertainment provider, and the global face of Britain. It's our most trusted news source in a world of divisive disinformation. But it is facing relentless attacks by powerful commercial and political enemies, including deep funding cuts - much deeper than most people realise - with imminent further cuts threatened. This book busts the myths about the BBC and shows us how we can save it, before it's too late.

The Warcraft Civilization: Social Science in a Virtual World (The\mit Press Ser.)

by William Sims Bainbridge

An exploration of the popular online role-playing game World of Warcraft as a virtual prototype of the real human future.World of Warcraft is more than a game. There is no ultimate goal, no winning hand, no princess to be rescued. WoW is an immersive virtual world in which characters must cope in a dangerous environment, assume identities, struggle to understand and communicate, learn to use technology, and compete for dwindling resources. Beyond the fantasy and science fiction details, as many have noted, it's not entirely unlike today's world. In The Warcraft Civilization, sociologist William Sims Bainbridge goes further, arguing that WoW can be seen not only as an allegory of today but also as a virtual prototype of tomorrow, of a real human future in which tribe-like groups will engage in combat over declining natural resources, build temporary alliances on the basis of mutual self-interest, and seek a set of values that transcend the need for war.What makes WoW an especially good place to look for insights about Western civilization, Bainbridge says, is that it bridges past and future. It is founded on Western cultural tradition, yet aimed toward the virtual worlds we could create in times to come.

The Water Engine: Editorial Alvi Books

by Ares Van Jaag

The "water engine" is an invention unfortunately invented many times. Hydrogen from water is very abundant, renewable and can be used in both energy poor and rich countries. Crude oil and natural gas are limited energy resources. But there are many people who think that certain promising technologies have been suppressed by various political or economic powers, usually with the purpose of protecting their investments and interests and, at the already more absurd extremes of the conspiracy illogical, for sinister motivations of much greater scope. In this new work, the versatile composer and writer Van Jaag, accompanies us on an exciting journey through the history of this unknown invention and its invented inventors.

The Wave Three Way To Building Your Downline

by Richard Poe

The face of home business has changed in recent years. People are building businesses based on good products, treating each other well, and using the power of internet technology. Now millions of people just like you are learning to make a living from home. In this book you'll find dozens of stories of people from soccer moms to beach bums and fortune 500 executives and how they learned to make a living from home. They show you how you can too.

The Way It Hurts

by Patty Blount

There may be two sides to every story, but sometimes there's only one way to set things right...Music is Elijah's life. His band plays loud and hard, and he'll do anything to get them a big break. He needs that success to help take care of his sister, who has special needs. So he'd rather be practicing when his friends drag him to a musical in the next town...until the lead starts to sing.Kristen dreams of a career on stage like her grandmother's. She knows she needs an edge to get into a competitive theater program—and being the star in her high school musical isn't going to cut it. The applause and the attention only encourage her to work harder.Elijah can't take his eyes off of Kristen's performance, and his swooning face is captured on camera and posted with an out-of-context comment. It goes viral. Suddenly, Elijah and Kristen are in a new spotlight as the online backlash spins out of control. And the consequences are bigger than they both could have ever imagined because these threats don't stay online...they follow them into real life.

The Way Things Work Now

by David Macaulay

A New York Times Bestseller Explainer-in-Chief David Macaulay updates the worldwide bestseller The New Way Things Work to capture the latest developments in the technology that most impacts our lives. Famously packed with information on the inner workings of everything from windmills to Wi-Fi, this extraordinary and humorous book both guides readers through the fundamental principles of machines, and shows how the developments of the past are building the world of tomorrow. This sweepingly revised edition embraces all of the latest developments, from touchscreens to 3D printer. Each scientific principle is brilliantly explained--with the help of a charming, if rather slow-witted, woolly mammoth. An illustrated survey of significant inventions closes the book, along with a glossary of technical terms, and an index. What possible link could there be between zippers and plows, dentist drills and windmills? Parking meters and meat grinders, jumbo jets and jackhammers, remote control and rockets, electric guitars and egg beaters? Macaulay explains them all.

The Way We Play: Theory of Game Design

by Michael Killick

Gain insight into what it takes to design and develop your first video game. This book offers a peek behind the scenes, where you will find in-depth knowledge of game design theory and insight into the technical and design aspects of video game development. The Way We Play allows you to explore game design and theory while also learning the nuances of how games in different genres should be approached, their workings, and successful unique selling points in a competitive gaming field. As you progress further into the book, BAFTA Nominated Young Games Design Mentor Michael Killick walks you through the more technical aspects of game development and shares techniques that will enable you to take your first steps in designing your own games. Upon completing this book, you will have a firm understanding of the gaming industry, from theory through design and production. What You Will Learn Understand theories within games designGrasp what it takes to design and create your first gameLook back at previous popular games and what made them so greatCover all aspects of design to allow you to begin designing your first video game Who Is This Book For: Anyone who would like to explore the fundamentals of game design and the theory behind it. This is also a chance to learn what goes into a game and how a game can be designed to be fun.

The Way of the Intellectual Dark Web: What Joe Rogan and His Associates Can Teach Us about Political Dialogue

by Jamie Q Roberts

Roberts presents a rigorous and accessible assessment of the Intellectual Dark Web’s origins, shared philosophy, cultural importance, and limitations. Since the mid-2010s, the Intellectual Dark Web (IDW) has been an unprecedented cultural and intellectual phenomenon. Using primarily podcasts and YouTube videos, a new generation of public intellectuals has appeared, loosely coalesced, and gained a vast global audience. This movement has encompassed a range of individuals, notably Joe Rogan, Jordan Peterson, Eric and Bret Weinstein, Ben Shapiro, Heather Heying, and Sam Harris. Other names more broadly associated with the grouping have included Steven Pinker, Jonathan Haidt, Elon Musk, Niall Ferguson, and Stephen Fry. There is a sprawling and ever-growing list of those who have appeared on IDW podcasts and videos, started their own podcasts along similar lines, and share a general ethos. It is a dispersed movement, but a significant one, given the reach of these various online outlets is in the millions globally. Roberts draws together and synthesises the core ideas espoused by the members of this movement and critically assesses its origins, coherence, and the impact it has had on politics and public discourse. He asks – to what extent has the IDW lived up to its professed goal of moving beyond polarisation and radicalisation? An insightful read both for followers of the IDW looking for a coherent and critical overview and for students of popular culture looking to understand this massive but decentralised popular intellectual movement.

The Way of the Web Tester: A Beginner's Guide to Automating Tests

by Jonathan Rasmusson

This book is for everyone who needs to test the web. As a tester, you'll automate your tests. As a developer, you'll build more robust solutions. And as a team, you'll gain a vocabulary and a means to coordinate how to write and organize automated tests for the web. Follow the testing pyramid and level up your skills in user interface testing, integration testing, and unit testing. Your new skills will free you up to do other, more important things while letting the computer do the one thing it's really good at: quickly running thousands of repetitive tasks.This book shows you how to do three things: How to write really good automated tests for the web. How to pick and choose the right ones.* How to explain, coordinate, and share your efforts with others.If you're a traditional software tester who has never written an automated test before, this is the perfect book for getting started. Together, we'll go through everything you'll need to start writing your own tests.If you're a developer, but haven't thought much about testing, this book will show you how to move fast without breaking stuff. You'll test RESTful web services and legacy systems, and see how to organize your tests.And if you're a team lead, this is the Rosetta Stone you've been looking for. This book will help you bridge that testing gap between your developers and your testers by giving your team a model to discuss automated testing, and most importantly, to coordinate their efforts.The Way of the Web Tester is packed with cartoons, graphics, best practices, war stories, plenty of humor, and hands-on tutorial exercises that will get you doing the right things, the right way.

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

by Arun Vishwanath

An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience.Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community&’s response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn&’t rely on continual training and retraining but provides a way to diagnose user vulnerability. Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees. The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.

The Wealth of Networks

by Yochai Benkler

With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today's emerging networked information environment. In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing-and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained-or lost-by the decisions we make today.

The Wealth of Virtual Nations

by Adam Crowley

This book considers representations of wealth and the wealthy in videogames. The introduction explores the estrangement of wealth from everyday life in the contemporary west, and argues that videogames have contributed to modern life by dramatizing the economic anxieties of our age -- in particular, those anxieties that relate to the Global Great Recession. A review of historical titles reveals that such and related efforts draw in significant ways from the literary tradition of sentimental romance, where wealth and the wealthy have long been associated with notions of the underworld or hell. The relevance of this tradition to contemporary titles is explored through a careful analysis of romantic themes and concerns with significance to acts of exchange. The Wealth of Virtual Nations will appeal to students with an interest in narrative theory, game design, literature, economics, and the humanities. It will also be of interest to the videogame industry.

The Web Accessibility Project: Development and Testing Best Practices

by Narayanan Palani

Approximately 15% of the global population is affected by some sort of disability, according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders, one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile, the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design, development, and extensive accessibility testing, which are essential for most of the customer-facing websites. In a fast-paced world, incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit, accessibility functional tests, and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book, developers can help their organizations rise to a whole new level of accessibility adherence, innovation, and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users.

The Web Application Hacker's Handbook

by Dafydd Stuttard Marcus Pinto

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous editionDiscusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and moreFeatures a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasksFocusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

by Dafydd Stuttard Marcus Pinto

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

The Web Collection Revealed Premium Edition: Adobe Dreamweaver CS6, Flash CS6, & Photoshop CS6

by Elizabeth Eisner Reding Sherry Bishop Jim Shuman

You can now maximize and integrate the design and development power of Adobe Creative Suite 6 with WEB COLLECTION REVEALED PREMIUM EDITION. This one of a kind text features Adobe Dreamweaver, Adobe Flash, and Adobe Photoshop in one resource, and provides practical experience with each software application through projects and learner-friendly tutorials. Also a full chapter on integration demonstrates how to move effortlessly from one application to another, while Power User Shortcuts and New Features icons point out key changes effective with the release of CS6. WEB COLLECTION REVEALED PREMIUM EDITION provides the information and practice you need to build professional-quality Websites, using all three of these Adobe applications! The Data Files used to complete the projects found in the book are now available online. For access information please refer to the directions available in the preface of the book.

The Web Collection Standard Edition: Revealed

by Sherry Bishop Jim Shuman Barbara Waxer

This comprehensive introductory book provides step-by-step instruction and in-depth explanation on three of today's most widely used Web design and development programs: Adobe Dreamweaver CS3, Adobe Flash CS3, and Adobe Fireworks CS3. Readers gain practical experience with the software as they work through end-of-chapter learning projects and step-by-step tutorials. An integration chapter demonstrates how to move from one application to the other while creating a Dreamweaver Web site that incorporates both Flash and Fireworks files. Full-color illustrations and a user-friendly design combine to create a solid learning experience that reveals how to master the latest features of these popular applications.

The Web Collection: Adobe Dreamweaver CS3, Flash CS3, and Fireworks CS3 Revealed

by Sherry Bishop James E. Shuman Barbara M. Waxer

This comprehensive introductory book provides step-by-step instruction and in-depth explanation on three of today's most widely used Web design and development programs: Adobe Dreamweaver CS3, Adobe Flash CS3, and Adobe Fireworks CS3. Readers gain practical experience with the software as they work through end-of-chapter learning projects and step-by-step tutorials. An integration chapter demonstrates how to move from one application to the other while creating a Dreamweaver Web site that incorporates both Flash and Fireworks files. Full-color illustrations and a user-friendly design combine to create a solid learning experience that reveals how to master the latest features of these popular applications.

The Web Designer's Idea Book

by Patrick Mcneil

Inspiring Web Design at a GlanceThe Web Designer's Idea Book includes more than 700 websites arranged thematically, so you can find inspiration for layout, color, style and more. Author Patrick McNeil has cataloged more than 5,000 sites on his website, and showcased in this book are the very best examples.Sites are organized by type, design style, theme, color, element and structure. Each chapter is easy to use and reference again and again, whether you're talking with a coworker or discussing website design options with a client. As a handy desk reference for design layout, color and style, this book is a must-have for starting new projects.

Refine Search

Showing 57,051 through 57,075 of 61,781 results