Browse Results

Showing 25,501 through 25,525 of 53,426 results

Information Theory and Coding - Solved Problems

by Predrag Ivaniš Dušan Drajić

This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.

Information Theory for Complex Systems: An Information Perspective on Complexity in Dynamical Systems and Statistical Mechanics (Understanding Complex Systems)

by Kristian Lindgren

This book introduces a comprehensive framework tailored for dissecting complex systems across diverse disciplines. What defines a complex system? How can we harness information to quantify its order, structure, and intricacy? Delving into phenomena from the intricate processes in physical systems to the dynamic behaviours in cellular automata and pattern formation, readers will uncover the profound interplay between physics and information theory. This intricate relationship provides fresh insight into physical phenomena, reimagining them through the lens of information. Notably, the book demystifies how seemingly opposing forces—rising order and increasing disorder—coexist, ultimately shedding light on the second law of thermodynamics as an outcome of deterministic, reversible dynamics beneath the surface. Geared towards graduate students, this book presumes an undergraduate foundation in mathematics and physics, ensuring a deep, engaging exploration for its readers.

Information Theory for Electrical Engineers (Signals And Communication Technology)

by Orhan Gazi

This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers working on communication subjects. The book especially focuses on the understandability of the topics, and accordingly uses simple and detailed mathematics, together with a wealth of solved examples.The book consists of four chapters, the first of which explains the entropy and mutual information concept for discrete random variables. Chapter 2 introduces the concepts of entropy and mutual information for continuous random variables, along with the channel capacity. In turn, Chapter 3 is devoted to the typical sequences and data compression. One of Shannon’s most important discoveries is the channel coding theorem, and it is critical for electrical and communication engineers to fully comprehend the theorem. As such, Chapter 4 solely focuses on it.To gain the most from the book, readers should have a fundamental grasp of probability and random variables; otherwise, they will find it nearly impossible to understand the topics discussed.

Information Theory, Mathematical Optimization, and Their Crossroads in 6G System Design (Springer Series in Wireless Technology)

by Shih-Chun Lin Tsung-Hui Chang Eduard Jorswieck Pin-Hsun Lin

This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication networks with AIoT (Artificial Intelligence plus Internet of Things). Design issues such as the intermittent connectivity, low latency, federated learning, IoT security, etc., are covered. This monograph provides a thorough picture of new results from information and optimization theories, as well as how their dialogues work to solve aforementioned 6G design issues.

Information Theory Tools for Visualization (AK Peters Visualization Series)

by Min Chen Miquel Feixas Ivan Viola Anton Bardera Han-Wei Shen Mateu Sbert

This book explores Information theory (IT) tools, which have become state of the art to solve and understand better many of the problems in visualization. This book covers all relevant literature up to date. It is the first book solely devoted to this subject, written by leading experts in the field.

The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World

by Alexis Wichowski

"A timely, compelling, and expertly researched passport to the tech companies that rule today's digital landscape."—Blake Harris, bestselling author of Console Wars and The History of the Future.In this provocative book about our new tech-based reality, political insider and tech expert Alexis Wichowski considers the unchecked rise of tech giants like Facebook, Google, Amazon, Apple, Microsoft, and Tesla—what she calls “net states”— and their unavoidable influence in our lives. Rivaling nation states in power and capital, today’s net states are reaching into our physical world, inserting digital services into our lived environments in ways both unseen and, at times, unknown to us. They are transforming the way the world works, putting our rights up for grabs, from personal privacy to national security. Combining original reporting and insights drawn from more than 100 interviews with technology and government insiders, including Microsoft president Brad Smith, Google CEO Eric Schmidt, the former Federal Trade Commission chair under President Obama, and the managing director of Jigsaw—Google’s Department of Counter-terrorism against extremism and cyber-attacks—The Information Trade explores what happens we give up our personal freedom and individual autonomy in exchange for an easy, plugged-in existence, and shows what we can do to control our relationship with net states before they irreversibly change our future.

Information Visualization

by Robert Spence

Information visualization is the act of gaining insight into data, and is carried out by virtually everyone. It is usually facilitated by turning data - often a collection of numbers - into images that allow much easier comprehension. Everyone benefits from information visualization, whether internet shopping, investigating fraud or indulging an interest in art. So no assumptions are made about specialist background knowledge in, for example, computer science, mathematics, programming or human cognition. Indeed, the book is directed at two main audiences. One comprises first year students of any discipline. The other comprises graduates - again of any discipline - who are taking a one- or two-year course of training to be visual and interaction designers. By focusing on the activity of design the pedagogical approach adopted by the book is based on the view that the best way to learn about the subject is to do it, to be creative: not to prepare for the ubiquitous examination paper. The content of the book, and the associated exercises, are typically used to support five creative design exercises, the final one being a group project mirroring the activity of a consultancy undertaking a design (not an implementation) for a client. Engagement with the material of this book can have a variety of outcomes. The composer of a school newsletter and the applicant for a multi-million investment should both be able to convey their message more effectively, and the curator of an exhibition will have new presentational techniques on their palette. For those students training to be visual/interaction designers the exercises have led to original and stimulating outcomes.

Information Warfare

by Daniel Ventre

Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?

Information Warfare

by Daniel Ventre

This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

Information Warfare

by Matthew Warren William Hutchinson

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare. This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful.Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced.

Informationssicherheit: Möglichkeiten und Grenzen

by Thomas Liedtke

Dieses Buch erklärt die wichtigsten Fachbegriffe und Inhalte und ordnet diese den entsprechenden Bereichen zu. Einbezogen werden auch scheinbare Randgebiete, die für die Informationssicherheit ebenfalls eine Rolle spielen. So wird der Themenkomplex Safety und Privacy hinsichtlich seiner Gemeinsamkeiten und Unterschiede beleuchtet. Das Buch zeigt aktuell verwendete Angriffsmuster und wie man sich dagegen schützen kann. Schutz muss dabei sowohl auf technischer Ebene (z. B. durch den Einsatz von Kryptographie) als auch auf organisatorischer und personeller Ebene (z. B. durch entsprechende Managementsysteme und Awareness-Schulungen) erfolgen. Wie lässt sich feststellen, wie sicher Daten sind? Wie lassen sich relevante Bedrohungen finden, gegen die man sich schützen muss? Wie verlaufen Risikoanalysen?

Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten: Eine kompakte Einführung in die Praxis (essentials)

by Inge Hanschke

In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO ) und des Informationssicherheitsmanagements eingeführt. Es wird aufgezeigt, welche wesentlichen Bestandteile für ein integriertes, einfaches und effektives Management-Instrumentarium erforderlich sind. Durch die Kombination mit Enterprise Architecture Management, IT-Servicemanagement und weiteren Disziplinen in ein integriertes Managementsystem kann die Wirksamkeit noch erhöht werden. Neben einer Einführung erhält der Leser Tipps und Tricks für die typischen Fallstricke in der Praxis sowie unmittelbar anwendbare Leitfäden und Empfehlungen – und dies kurz und prägnant.

Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten: Eine kompakte Einführung in die Praxis (essentials)

by Inge Hanschke

In diesem Buch werden die Anforderungen der EU-Datenschutz-Grundverordnung (EU-DSGVO) und des Informationssicherheitsmanagements eingeführt. Es wird aufgezeigt, welche wesentlichen Bestandteile für ein integriertes, einfaches und effektives Management-Instrumentarium erforderlich sind. Durch die Kombination mit Enterprise Architecture Management, IT-Servicemanagement und weiteren Disziplinen in ein integriertes Managementsystem kann die Wirksamkeit noch erhöht werden. Neben einer Einführung erhält der Leser Tipps und Tricks für die typischen Fallstricke in der Praxis sowie unmittelbar anwendbare Leitfäden und Empfehlungen – und dies kurz und prägnant. In der 2. Auflage wurden kleinere Fehler korrigiert.

Informationstechnologie für Ingenieure

by Torsten Gilz Martin Eigner Fabrice Mogo Nem Florian Gerhardt

Technische Produkte sind heute komplexe Systeme, die von mehreren Ingenieurdisziplinen gemeinsam entwickelt werden. Deshalb gehört die Informationstechnologie zum Ausbildungscurriculum von Ingenieuren. In dem Buch werden technische Anwendungssysteme für die Entwicklung (Computer Aided Design), die Berechnung und Simulation (Computer Aided Engineering), die Administration (Product Lifecycle Management) und die Visualisierung vorgestellt. Auch der mechatronische Produktentwicklungsprozess und die Softwareerstellung werden detailliert erläutert.

Informatique Durable et Gestion Énergétique

by Ajit Singh

L’informatique durable est l’effort de réduction de la consommation d’énergie des ordinateurs par l’efficacité. Elle suit l’idéal de développement durable : le progrès sans compromettre le futur. Même si les ordinateurs n’utilisent que 3% de l’énergie aux Etats-Unis, les solutions informatiques permettent d’avoir une plus grande influence sur l’informatique durable. Les termes informatique durable, informatique verte, numérique responsable et éco-TIC peuvent être utilisés de manière interchangeable. Lorsqu’ils sont activement mis en œuvre, ils répondent à la responsabilité éthique de protéger l’environnement en soutenant l’efficacité énergétique. Pour les sociétés, l’informatique durable fait partie du programme de responsabilité sociale des entreprises (RSE). Trois motivations de l’informatique durable sont le profit, les règlementations et l’éthique.

Informatorische Assistenzsysteme in der variantenreichen Montage: Theorie und Praxis

by Manfred Bornewasser Sven Hinrichsen

In diesem Buch werden die Herausforderungen bei der Einführung von informatorischen Assistenzsystemen in der Montage erörtert und umfangreiche Gestaltungsempfehlungen vermittelt.Die industrielle Montage ist in Deutschland nach wie vor von hoher volkswirtschaftlicher Bedeutung. In der Industrie existieren zehntausende Montagearbeitsplätze. Diese verändern sich. Infolge hoher Wettbewerbsintensität und Innovationsdynamik entstehen immer mehr Produktvarianten, die zu einer Zunahme der Komplexität der Montagearbeit beitragen. Es stellt sich daher die Frage, wie mit dieser gestiegenen Komplexität umzugehen und wie diese seitens der Beschäftigten zu bewältigen ist, ohne dass es zu Überbeanspruchungen und einem Verfehlen von Produktivitätszielen kommt. Während Montage bislang vornehmlich als energetische Arbeit begriffen wurde, rücken künftig die kognitiven Anteile der Montagearbeit in den Vordergrund. In diesem Zusammenhang kommt dem Komplexitäts- und Informationsmanagement eine entscheidende Rolle zu: Während früher Strategien des Vereinfachens, z. B. durch fortschreitende Arbeitsteilung, im Vordergrund standen, gewinnen heute Strategien des Beherrschens der Komplexität an Bedeutung. Im Zentrum dieses Paradigmenwechsels stehen informatorische Assistenz­systeme, die den Beschäftigten im Montageprozess mit Informationsangeboten unter­stützen und so die wachsende Komplexität sicher beherrschbar machen.

Informed Urban Environments: Data-Integrated Design for Human and Ecology-Centred Perspectives (The Urban Book Series)

by Katia Perini Michael U. Hensel Ata Chokhachian

This book collects ground-breaking works on the actual and potential impact of big data and data-integrated design for resilient urban environments, including human- and ecology-centred perspectives. Comprehending and designing for urban social, demographic and environmental change is a complex task. Big data, data structuring, data analysis (i.e. AI and ML) and data-integrated design can play a significant role in advancing approaches to this task. The themes presented in this book include urban adaptation, urban morphology, urban mobility, urban ecosystems, urban climate, urban ecology and agriculture. Given the compound nature of complex sustainability problems, most chapters address the correlation between several of these themes. The book addresses practitioners, researchers and graduate students concerned with the rapidly increasing role of data in developing urban environments.

Informing Energy and Climate Policies Using Energy Systems Models

by George Giannakidis Maryse Labriet Brian Ó Gallachóir Giancarlo Tosato

This book highlights how energy-system models are used to underpin and support energy and climate mitigation policy decisions at national, multi-country and global levels. It brings together, for the first time in one volume, a range of methodological approaches and case studies of good modeling practice on a national and international scale from the IEA-ETSAP energy technology initiative. It provides insights for the reader into the rich and varied applications of energy-system models and the underlying methodologies and policy questions they can address. The book demonstrates how these models are used to answer complex policy questions, including those relating to energy security, climate change mitigation and the optimal allocation of energy resources. It will appeal to energy engineers and technology specialists looking for a rationale for innovation in the field of energy technologies and insights into their evolving costs and benefits. Energy economists will gain an understanding of the key future role of energy technologies and policy makers will learn how energy-system modeling teams can provide unique perspectives on national energy and environment challenges. The book is carefully structured into three parts which focus on i) policy decisions that have been underpinned by energy-system models, ii) specific aspects of supply and end-use sector modeling, including technology learning and behavior and iii) how additional insights can be gained from linking energy-system models with other models. The chapters elucidate key methodological features backed up with concrete applications. The book demonstrates the high degree of flexibility of the modeling tools used to represent extremely different energy systems, from national to global levels.

The InfoSec Handbook: An Introduction to Information Security

by Umesh Hodeghatta Rao Umesha Nayak

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it's an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face. What you'll learn Essentials of information security in all forms Importance of information security in present day business Establishing an ISMS through a step by step process Best practices in implementation The various domains of information security Who this book is for Beginners to experts in information security Table of Contents 1: Introduction to Security2: History of Computer Security3: Key Concepts and Principles4: Access Controls5: Information Systems Management6: Application and Web Security7: Malicious Software and Anti-Virus Software8: Cryptography9: Understanding Networks10: Firewalls11: Intrusion Detection and Prevention Systems12: Virtual Private Networks13: Data Backups & Cloud Computing14: Physical Security and Biometrics15: Social Engineering16. Current Trends in Information Security17. Bibliography"

Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far

by Ted Demopoulos

Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits. Maybe you think you can’t be a Rock Star, but everyone can MOVE towards it and reap the benefits of vastly increased success. Remember, “Geek” will only get you so far . . .

Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices

by Joseph MacMillan

Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.

Infostorms: Why do we 'like'? Explaining individual behavior on the social net, 2nd Edition

by Vincent F. Hendricks Pelle G. Hansen

With points of departure in philosophy, logic, social psychology, economics, and choice and game theory, Infostorms shows how information may be used to improve the quality of personal decision and group thinking but also warns against the informational pitfalls which modern information technology may amplify: From science to reality culture and what it really is, that makes you buy a book like this.<P><P> The information society is upon us. New technologies have given us back pocket libraries, online discussion forums, blogs, crowdbased opinion aggregators, social media and breaking news wherever, whenever. But are we more enlightened and rational because of it? <P> Infostorms provides the nuts and bolts of how irrational group behaviour may get amplified by social media and information technology. If we could be collectively dense before, now we can do it at light speed and with potentially global reach. That’s how things go viral, that is how cyberbullying, rude comments online, opinion bubbles, status bubbles, political polarisation and a host of other everyday unpleasantries start. Infostorms will give the story of the mechanics of these phenomena. This will help you to avoid them if you want or learn to start them if you must. It will allow you to stay sane in an insane world of information.

Infostorms

by Vincent F. Hendricks Pelle G. Hansen

The information society is upon us and with it comes the constant barrage of information accessible wherever, whenever. This book explores the role of knowledge (or lack thereof) prevalent in society, and investigates the dangers lurking in information technology and democracy as a whole.<P><P> Information is a condition for a robust democracy; people should vote based on sound information. But sound information doesn’t come easy and without labor. It must be properly handled and formatted before it is useful for deliberation, decision and action. In the information age, understanding the means by which information is processed becomes a crucial democratic instrument for the individual as well as the group.<P><P> With points of departure in philosophy, social psychology, economics, and choice- and game theory, Infostorms shows how information may be used to improve the quality of personal decision and group thinking but also warns against the informational pitfalls which modern information technology may amplify. Covering topics including the continued war efforts, the social media success, polarization in politics, stock, science or opinion bubbles this book’s broad approach offers an excellent overview on information (technology) and valuable guidance on how to take information punches.

Infotech English for Computer Users

by Santiago Remacha Esteras

Fully updated in line with the latest developments in Information Communications Technology (ICT), this course teaches students the language and skills they need to understand and work in the world of computers. A focus on terminology is combined with vocabulary and grammar practice to give students the tools to use English in areas such as describing features and functions, applying for jobs and discussing the world of ICT. The Student's Book contains 30 topic-based units covering everything from computer essentials through to programming, web design, job-hunting, and future technologies.

Infrared Small Target Detection: Theory, Methods, and Algorithms.

by Hu Zhu Yushan Pan Lizhen Deng Guoxia Xu

Uncover the secrets of cutting-edge research in “Infrared Small Target Detection,” a crucial resource that delves into the dynamic world of infrared imaging and detection algorithms. This comprehensive book is an indispensable gem for the research community, offering a profound introduction to the theory, methods, and algorithms underlying infrared small object detection. As an invaluable guide, this book explores diverse models and categories of infrared small object detection algorithms, providing meticulous descriptions and comparisons of their strengths and limitations. Perfectly tailored for researchers, practitioners, and students with a passion for infrared imaging and detection, this book equips readers with the necessary knowledge to embark on groundbreaking investigations in this field.Readers can particularly be drawn to the book's methods, results, and topics, encompassing diverse categories of infrared small object detection algorithms and their corresponding advantages and disadvantages. The book also imparts foundational knowledge in mathematical morphology, tensor decomposition, and deep learning, enabling readers to grasp the underlying principles of these advanced algorithms. Experience the key benefits of “Infrared Small Target Detection” as readers gain a profound understanding of theory, methods, and algorithms tailored to infrared small object detection. The comprehensive descriptions and comparisons of various algorithm categories empower readers to select the perfect algorithms for their specific applications. Unlock the potential of this groundbreaking resource with a basic understanding of mathematics, statistics, and image processing. Some familiarity with infrared imaging and detection proves advantageous in fully immersing oneself in the wealth of knowledge presented within these pages.

Refine Search

Showing 25,501 through 25,525 of 53,426 results