Browse Results

Showing 1 through 25 of 36,337 results

كتاب العشق الإلكتروني

by عبدالله علي الأسمري

كم كانت رائعة تلك اللحظة التي قررت فيها قبل عقد من الزمن أن أدلف إلى مقهى للإنترنت في قلب مدينة الرياض لأول مرة في حياتي. رأيت عامل المقهى وقد ارتسمت على وجهه ابتسامة عريضة وهو يقودني إلى مربع صغير يحوي طاولة انتصب عليها جهاز حاسوبي ذي شاشة عريضة. بدا المكان معزولا من ثلاث جهات أما الجهة الرابعة والتي يتم من خلالها الدخول فكانت عبارة عن باب صغير ينغلق بمجرد الدخول. بعد أن استويت على المقعد هرع العامل إلى أيقونة المتصفح browser ليطمس منه سجل المستخدم السابق وذلك - على ما يبدو - لكي لا أ لقي نظرة على ما كان يفعله من جاء قبلي. لم تسعفني خبرتي إذ ذاك في تفسر مغزى ذلك التصرف

掌握比特币-开始赚取比特币的指导: New Moon (Vampyre Ser.)

by Adidas Wilson 顺宏

比特币是由名不副实的程序员或者一群程序员发明的一种加密货币和数字支付系统,名叫Satoshi Nakamoto。 它在2009年作为开源软件发布。 系统是点对点的,交易是直接在用户之间进行的,没有中间人。 这些交易由网络节点验证,并记录在称为区块链的公共分布式账本中。 由于该系统没有中央存储库或单个管理员,比特币被称为第一个分散数字货币。 比特币除了被创造为挖矿的奖励外,还可以在合法或黑市交换其他货币,产品和服务。 截至2015年2月,超过10万商户和供应商接受比特币作为付款。 根据剑桥大学2017年的研究报告,使用加密货币钱包的用户数量达到2.9-580万,其中大部分使用比特币。

Digital Art Masters: Volume 4 (Digital Art Masters Series)

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 4 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breaktaking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. This book offers inspiration and insight for the advanced amateur and professional CG artists. The Digital Art Masters series has expanded upon the competition's gallery book concept and has added the insight and experiences of professional CG artists worldwide. Divided into 5 sections, Sci-Fi, Scene, Fantasy, Character and Cartoon, Each featured artist segement will include the thought processes behind creating unique digital images and an artist portfolio for further inspiration. Find your inspiration and discover the tips, tricks and techniques that really work.

Digital Art Masters: Volume 2

by 3dtotal.Com

Meet some of the finest digital 2D and 3D artists working in the industry today, from Patrick Beaulieu, Philip Straub, Benita Winckler, Alessandro Baldasseroni to Khalid Al Muharraqi, Marcel Baumann and Marek Denko and see how they work. More than just a gallery book - in Digital Arts Masters each artist has written a breakdown overview, with supporting imagery of how they made there piece of work.With Digital Arts Masters you'll understand the artists' thought process and discover the tips, tricks and techniques which really work.

Digital Art Masters: Volume 5

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 5 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breath taking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. New to this volume will be 5 artist video tutorials. Five artists will specifically detail an aspect of their gallery image from start to finish, offering further technique driven insight and expertise offering 2 ½ hours of additional inspiration. With a click of a mouse, artists willbe able to apply the leading techniques to their own work with access to additional video tutorials, source files, textures and digital brushes at the companion website: http://www.focalpress.com/digital-art-masters/index.html.

Digital Painting Techniques: Masters Collection

by 3dtotal.Com

Discover the tips, tricks and techniques that really work for concept artists, matte painters and animators. Compiled by the team at 3dtotal.com, Digital Painting Techniques, Volume 1 offers digital inspiration with hands-on insight and techniques from professional digital artists. More than just a gallery book - within Digital Painting Techniques each artist has written a breakdown overview, with supporting imagery of how they made their piece of work. Beginner and intermediate digital artists will be inspired by the gallery style collection of the finest examples of digital painting from world renowned digital artists. Start your mentorship into the world of digital painting today with some of the greatest digital artists in the world and delve into professional digital painting techiques, such as speed painting, custom brush creation and matte painting. Develop your digital painting skills beyond the variety of free online digital painting tutorials and apply the most up to date techniques to your digital canvas with Digital Painting Techniques for Animators.

CWNA Certified Wireless Network Administrator Official Study Guide

by David A. Coleman David D. Westcott

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802. 11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP's website at www. cwnp. com/sybex.

Computational Science and its Applications

by A. H. Siddiqi, R. C. Singh, G. D. Veerappa Gowda

Computational science is a rapidly growing multidisciplinary field concerned with the design, implementation, and use of mathematical models to analyze and solve real-world problems. It is an area of science that spans many disciplines and which involves the development of models and allows the use of computers to perform simulations or numerical analysis to understand problems that are computational and theoretical. Computational Science and its Applications provides an opportunity for readers to develop abilities to pose and solve problems that combine insights from one or more disciplines from the natural sciences with mathematical tools and computational skills. This requires a unique combination of applied and theoretical knowledge and skills. The topics covered in this edited book are applications of wavelet and fractals, modeling by partial differential equations on flat structure as well as on graphs and networks, computational linguistics, prediction of natural calamities and diseases like epilepsy seizure, heart attack, stroke, biometrics, modeling through inverse problems, interdisciplinary topics of physics, mathematics, and medical science, and modeling of terrorist attacks and human behavior. The focus of this book is not to educate computer specialists, but to provide readers with a solid understanding of basic science as well as an integrated knowledge on how to use essential methods from computational science. Features: Modeling of complex systems Cognitive computing systems for real-world problems Presentation of inverse problems in medical science and their numerical solutions Challenging research problems in many areas of computational science This book could be used as a reference book for researchers working in theoretical research as well as those who are doing modeling and simulation in such disciplines as physics, biology, geoscience, and mathematics, and those who have a background in computational science.

Packet Tracer Network Simulator

by Jesin A

A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer. Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

Creating Signature Stories: Strategic Messaging that Persuades, Energizes and Inspires

by David Aaker

Stories are orders of magnitude which are more effective than facts at achieving attention, persuading, being remembered, and inspiring involvement. Signature stories—intriguing, authentic, and involving narratives—apply the power of stories to communicate a strategic message. Marketing professionals, coping with the digital revolution and the need to have their strategic message heard internally and externally, are realizing that a digital strategy revolves around content and that content is stories.Creating Signature Stories shows organizations how to introduce storytelling into their strategic messaging, and guides organizations to find, or even create, signature stories and leverage them over time. With case studies built into every chapter, organizations will realize the power of storytelling to energize readers, gain visibility, persuade audiences, and inspire action.

Owning Game-Changing Subcategories: Uncommon Growth in the Digital Age

by David Aaker

Owning Game-Changing Subcategories is about creating organizational growth in the digital age by creating and owning game-changing subcategories fueled by digital.Owning Game-Changing Subcategories outlines the path to finding, managing, and leveraging new subcategories. In the digital age, the path has been made wider, shorter, and more frequently traveled. Throughout Owning Game-Changing Subcategories, David Aaker discusses certain aspects of the digital age that alter this path, such as E-commerce providing fast, inexpensive market access bypassing the cost of gaining distribution into storefront retailers or creating personal sales teams and social media and websites enabling communication on steroids in comparison with traditional use of advertising or events. Growth is not only a success measure but also creates energy and opportunity for customers and employees. And such growth almost never occurs with “my brand is better than your brand” marketing. Owning Game-Changing Subcategories explores the only ways to grow a business (with rare exceptions) which is to:develop new “must haves” that define a game-changing subcategory that provides a new or markedly superior buying or use experience or brand relationship to a core customer base;become the exemplar brand that represents the subcategory and drives its visibility, positioning, and success; and create barriers to competitors that could include “must-have” associations and a basis of relationships that go beyond functional benefits.

Photoshop CS2 RAW

by Mikkel Aaland

The RAW file format is the uncompressed data file captured by a digital camera's electronic sensor. When your camera saves an image in RAW format, settings like white balance, sharpening, contrast and saturation are not applied to the image but are saved instead in a separate header. Because RAW files remain virtually untouched by in-camera processing, they are essentially the digital equivalent to exposed but undeveloped film. This makes RAW an increasingly popular format with amateur and professional digital photographers, because it affords greater flexibility and control during the editing process-if you know how to work with RAW files. Most digital camera manufacturers supply their own software for converting RAW data, as do some third party vendors. Increasingly, however, the RAW converter of choice is a plug-in included in the latest version of Adobe Photoshop, the most popular and widely-used digital image editing tool in the world. Adobe Photoshop CS2 is emerging as the best place to edit RAW images, and the best way to master this new format is with Photoshop CS2 RAW. An important book dedicated to working with RAW in Photoshop, this comprehensive guide features a unique design that helps readers grasp the subject through visual instruction and prompts. The entire RAW process is explored, from shooting to using the Adobe plug-in converter and new Bridge navigation software. The primary focus of Photoshop RAW is, as the title suggests, Photoshop editing technique: automating RAW workflow, correcting exposures, extending exposure range, manipulating grayscale and working with the new DNG (Digital Negative) open standard that Adobe supports. Presented by photographer Mikkel Aaland, a pioneer of digital photography and author of eight books, including O'Reilly's Photoshop for the Web and the award-winning Shooting Digital, Photoshop CS2 RAW investigates and instructs in an accessible visual style. Required reading for professionals and dedicated photo hobbyists alike.

Microsoft Dynamics AX 2012 Financial Management

by Mohamed Aamer

This book is a practical, hands-on guide that covers both the basic and advanced concepts of financial management using Microsoft Dynamics AX.Microsoft Dynamics AX Financial Management is for Microsoft Dynamics AX solution architects, application consultants, support engineers, pre-technical sales consultants, and project managers on the partner side, as well as chief financial officers, financial controllers, accounting managers, key users, business analysts, and chief information officers on the customer side. A basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies will help you better understand the concepts covered in this book.

Microsoft Dynamics AX 2012 R3 Financial Management

by Mohamed Aamer

This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

Quantum Computing since Democritus

by Scott Aaronson

Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists

by Frank Abagnale

Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks.Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: * The best way to protect your phone from being hacked * The only time you should ever use a debit card * The one type of photo you should never post on social media * The only conditions under which you should use WiFi networks at the airport * The safest way to use an ATM With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet.

Numerische Methoden für Ingenieure: mit Anwendungsbeispielen in Python

by Bilen Emek Abali Celal Çakıroğlu

Technische Systeme werden von Ingenieur*innen modelliert und durch numerische Methoden simuliert. Dieses Lehrbuch bietet eine unkomplizierte Einführung in numerische Methoden, mit zahlreichen, praxisrelevanten Beispielen, die mithilfe der Programmiersprache Python gelöst werden. In ingenieurwissenschaftlichen Studienrichtungen sowie in allen Forschungsprojekten sind numerische Simulationen unumgänglich, geeignete Methoden aber oft schwierig zu begreifen. Hier erklären Ingenieure die mathematischen Grundlagen der numerischen Methoden in sachlicher, dennoch simpler Sprache, mit konkreten Anwendungsbeispielen auf Papier und am Bildschirm. Die Besonderheit in diesem Buch ist, dass nicht nur Modelle der physikalischen Systeme berechnet und experimentelle Daten bearbeitet werden, sondern der Code in Python Zeile für Zeile angegeben und erklärt wird. Über die Autoren: B. E. Abali arbeitet als Dozent an der Technischen Universität Berlin sowie der Türkisch-Deutschen Universität in Istanbul, und hat an der Technischen Universität München, University of California Berkeley in den USA und Ghent University in Belgien geforscht. C. Çakıroğlu ist Dozent an der Türkisch-Deutschen Universität in Istanbul und hat an der Technischen Universität Braunschweig, dem DLR (Deutsches Zentrum für Luft- und Raumfahrt) und der University of Alberta in Kanada geforscht.

Predicting the Future

by Henry Abarbanel

Through the development of an exact path integral for use in transferring information from observations to a model of the observed system, the author provides a general framework for the discussion of model building and evaluation across disciplines. Through many illustrative examples drawn from models in neuroscience, geosciences, and nonlinear electrical circuits, the concepts are exemplified in detail. Practical numerical methods for approximate evaluations of the path integral are explored, and their use in designing experiments and determining a model's consistency with observations is explored.

Applications and Usability of Interactive TV: 5th Iberoamerican Conference, jAUTI 2016, La Habana, Cuba, November 21-25, 2016, Revised Selected Papers (Communications in Computer and Information Science #689)

by María José Abásolo Pedro Almeida Joaquín Pina Amargós

This book constitutes the refereed proceedings of the 5th Iberoamerican Conference on Applications and Usability of Interactive TV , jAUTI 2016, held in conjunction with the III International Congress on Information Engineering and Information Systems, in La Habana, Cuba, in November 2016. The 11 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on IDTV content production and recommendation; video consumption and preservation; social TV; IDTV interaction techniques; IDTV user experiences.

Applications and Usability of Interactive TV: 7th Iberoamerican Conference, jAUTI 2018, Bernal, Argentina, October 16–18, 2018, Revised Selected Papers (Communications in Computer and Information Science #1004)

by María José Abásolo Telmo Silva Nestor D. González

This book constitutes the refereed proceedings of the 7th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2018, in Bernal, Argentina, in October 2018.The 13 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Contexts of application of the IDTV; Design and Implementation Techniques of IDTV Content and Services; Interaction Techniques, Technologies and Accesibility of IDTV Services; Testing and User Experience of IDTV Services.

Hybrid Systems Biology

by Alessandro Abate David Šafránek

This book constitutes the thoroughly referred post-workshop proceedings of the 4th International Workshop on Hybrid Systems biology, HSB 2015, held as part of the Madrid Meet 2015 event, in Madrid, Spain in September 2015. The volume presents 13 full papers together with 2 abstracts of invited sessions from 18 submissions. The scope of the HSB workshop is the general area of dynamical models in Biology with an emphasis on hybrid approaches -- by no means restricted to a narrow class of mathematical models -- and taking advantage of techniques developed separately in different areas.

Computational Methods in Systems Biology: 18th International Conference, CMSB 2020, Konstanz, Germany, September 23–25, 2020, Proceedings (Lecture Notes in Computer Science #12314)

by Alessandro Abate Verena Wolf Tatjana Petrov

This book constitutes the refereed proceedings of the 18th International Conference on Computational Methods in Systems Biology, CMSB 2020, held in Konstanz, Germany, in September 2020.*The 17 full papers and 5 tool papers were carefully reviewed and selected from 30 submissions. In addition 3 abstracts of invited talks and 2 tutorials have been included in this volume. Topics of interest include formalisms for modeling biological processes; models and their biological applications; frameworks for model verification, validation, analysis, and simulation of biological systems; high-performance computational systems biology and parallel implementations; model inference from experimental data; model integration from biological databases; multi-scale modeling and analysis methods; computational approaches for synthetic biology; and case studies in systems and synthetic biology. * The conference was held virtually due to the COVID-19 pandemic.

Curves and Surfaces (UNITEXT)

by M. Abate F. Tovena

The book provides an introduction to Differential Geometry of Curves and Surfaces. The theory of curves starts with a discussion of possible definitions of the concept of curve, proving in particular the classification of 1-dimensional manifolds. We then present the classical local theory of parametrized plane and space curves (curves in n-dimensional space are discussed in the complementary material): curvature, torsion, Frenet's formulas and the fundamental theorem of the local theory of curves. Then, after a self-contained presentation of degree theory for continuous self-maps of the circumference, we study the global theory of plane curves, introducing winding and rotation numbers, and proving the Jordan curve theorem for curves of class C2, and Hopf theorem on the rotation number of closed simple curves. The local theory of surfaces begins with a comparison of the concept of parametrized (i.e., immersed) surface with the concept of regular (i.e., embedded) surface. We then develop the basic differential geometry of surfaces in R3: definitions, examples, differentiable maps and functions, tangent vectors (presented both as vectors tangent to curves in the surface and as derivations on germs of differentiable functions; we shall consistently use both approaches in the whole book) and orientation. Next we study the several notions of curvature on a surface, stressing both the geometrical meaning of the objects introduced and the algebraic/analytical methods needed to study them via the Gauss map, up to the proof of Gauss' Teorema Egregium. Then we introduce vector fields on a surface (flow, first integrals, integral curves) and geodesics (definition, basic properties, geodesic curvature, and, in the complementary material, a full proof of minimizing properties of geodesics and of the Hopf-Rinow theorem for surfaces). Then we shall present a proof of the celebrated Gauss-Bonnet theorem, both in its local and in its global form, using basic properties (fully proved in the complementary material) of triangulations of surfaces. As an application, we shall prove the Poincaré-Hopf theorem on zeroes of vector fields. Finally, the last chapter will be devoted to several important results on the global theory of surfaces, like for instance the characterization of surfaces with constant Gaussian curvature, and the orientability of compact surfaces in R3.

Recent Advances on Soft Computing and Data Mining

by Jemal H. Abawajy Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book offers a systematic overview of the concepts and practical techniques that readers need to get the most out of their large-scale data mining projects and research studies. It guides them through the data-analytical thinking essential to extract useful information and obtain commercial value from the data. Presenting the outcomes of International Conference on Soft Computing and Data Mining (SCDM-2017), held in Johor, Malaysia on February 6-8, 2018, it provides a well-balanced integration of soft computing and data mining techniques. The two constituents are brought together in various combinations of applications and practices. To thrive in these data-driven ecosystems, researchers, engineers, data analysts, practitioners, and managers must understand the design choice and options of soft computing and data mining techniques, and as such this book is a valuable resource, helping readers solve complex benchmark problems and better appreciate the concepts, tools, and techniques employed.

Refine Search

Showing 1 through 25 of 36,337 results