Browse Results

Showing 29,026 through 29,050 of 53,443 results

iFM 2023: 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings (Lecture Notes in Computer Science #14300)

by Paula Herber Anton Wijs

This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.

If You're Bored With Your Camera Read This Book (If you're ... Read This Book #2)

by Demetrius Fordham

You know photography, don't you? Nice group pictures, tasteful landscapes, perhaps a filter from an app on your phone. Conventional, easy to manage, inoffensive, boring...right?WRONG! In this book you'll find inspiring ideas and genuinely different techniques that you can use to capture anything, from artistic portraits, through to stunning street photography and unusual aboreals. This book will open your eyes, and your lens cap, to new ideas.Topics include:Put Down Your CameraForget the RulesCreative Shooting ExercisesGo Back to Basics

If You're Bored With Your Camera Read This Book (If You're ... Read This Book Ser.)

by Demetrius Fordham

You know photography, don't you? Nice group pictures, tasteful landscapes, perhaps a filter from an app on your phone. Conventional, easy to manage, inoffensive, boring...right?WRONG! In this book you'll find inspiring ideas and genuinely different techniques that you can use to capture anything, from artistic portraits, through to stunning street photography and unusual aboreals. This book will open your eyes, and your lens cap, to new ideas.Topics include:Put Down Your CameraForget the RulesCreative Shooting ExercisesGo Back to Basics

If You, Then Me

by Yvonne Woon

Warm and funny, this coming-of-age romcom from teen author Yvonne Woon is set in Silicon Valley and delves into the questions we all ask when making mistakes—in life and in love—perfect for fans of Emergency Contact and When Dimple Met Rishi. <p><p> What would you ask your future self? First question: What does it feel like to kiss someone?Xia is stuck in a lonely, boring loop. Her only escapes are Wiser, an artificial intelligence app she designed to answer questions as her future self, and a mysterious online crush she knows only as ObjectPermanence. <p><p> Until one day Xia enrolls at the Foundry, an app incubator for tech prodigies in Silicon Valley, and suddenly anything is possible. Flirting with Mast, a classmate also working on AI, leads to a date. Speaking up generates a vindictive nemesis intent on publicly humiliating her. And running into Mitzy Erst, Foundry alumna and Xia’s idol, could give Xia all the answers. <p><p> And then Xia receives a shocking message from ObjectPermanence. He is at the Foundry, too. Xia is torn between Mast and ObjectPermanence—just as Mitzy pushes her towards a shiny new future. Xia doesn’t have to ask Wiser to know: The right choice could transform her into the future self of her dreams, but the wrong one could destroy her.

If You Like World-Building Games, Try This! (Away From Keyboard)

by Marne Ventura

Even the most game-crazed kids need a tech timeout. No cheat codes needed for this collection of DIY projects! Bring world-building games to life with miniature medieval towns, sweet castles, pixel pillows, and more!

If You Like Sports Games, Try This! (Away From Keyboard)

by Marne Ventura

Even the most game-crazed kids need a tech timeout. No cheat codes needed for this collection of DIY projects! From baseball and football to racecars and obstacle courses, these activities bring sport games to life.

If You Like Exploring, Adventuring, or Teamwork Games, Try This! (Away From Keyboard)

by Daniel Mauleón

Even the most game-crazed kids need a tech timeout. No cheat codes needed for this collection of DIY projects! Not enough controllers for the whole crew? No problem! Bring adventure and teamwork games to life with these activities.

If We Build It: Scholarly Communications and Networking Technologies: Proceedings of the North American Serials Inte

by Mls Suzanne McMahon

Help lay the foundation for the future of scholarly communication with these informative chapters on new information technologies and predictions for developments in the publishing industry. If We Build It, the proceedings from the 7th annual conference of the North American Serials Interest Group, stresses that the time to prepare for the revolution and phenomenal growth in electronic technology is now.This groundbreaking book addresses important questions about the future that libraries need to answer today such as: What will change for serials librarians, vendors, and publishers as ink and paper become the oddity and electronic transmitters and receivers become the norm? What services will be in demand and who will provide them? Which economic models will keep them afloat? Most importantly, can the disparate groups currently active in scholarly communication work together to build the physical, social, and economic backbone of a new model?If We Build It is an invaluable guide to the future of serials librarianship. It describes new technologies, predicts how the publishing industry will develop in the near future, and explores how the library may evolve within a new system of scholarly communication. Just a few of the exciting topics covered in these proceedings include the development of standards for networking technologies, the shift from ownership to access in libraries as a result of electronic information, the history of scholarly communication, copyright of electronic data, higher education in the 1990?s, marketing in libraries. A unique perspective on issues of cooperation between librarians, scholars, and publishers is provided by the inclusion of a joint conference day with the Society for Scholarly Publishing. If We Build It is an energizing look at the new possibilities for libraries and a call to strengthen structures and work together to build a solid future for libraries within the future of scholarly communication.

If Then: How One Data Company Invented the Future

by Jill Lepore

Radio 4's Book of the WeekA Financial Times Book of the YearShortlisted for the 2020 Financial Times / McKinsey Business Book of the YearLonglisted for the National Book Award 'The story of the original data science hucksters of the 1960s is hilarious, scathing and sobering - what you might get if you crossed Mad Men with Theranos' David RuncimanThe Simulmatics Corporation, founded in 1959, mined data, targeted voters, accelerated news, manipulated consumers, destabilized politics, and disordered knowledge--decades before Facebook, Google, Amazon, and Cambridge Analytica. Silicon Valley likes to imagine it has no past but the scientists of Simulmatics are the long-dead grandfathers of Mark Zuckerberg and Elon Musk. Borrowing from psychological warfare, they used computers to predict and direct human behavior, deploying their "People Machine" from New York, Cambridge, and Saigon for clients that included John Kennedy's presidential campaign, the New York Times, Young & Rubicam, and, during the Vietnam War, the Department of Defence. In If Then, distinguished Harvard historian and New Yorker staff writer, Jill Lepore, unearths from the archives the almost unbelievable story of this long-vanished corporation, and of the women hidden behind it. In the 1950s and 1960s, Lepore argues, Simulmatics invented the future by building the machine in which the world now finds itself trapped and tormented, algorithm by algorithm.'A person can't help but feel inspired by the riveting intelligence and joyful curiosity of Jill Lepore. Knowing that there is a mind like hers in the world is a hope-inducing thing' George Saunders, Man Booker Prize-winning author of Lincoln in the Bardo'An authoritative account of the origins of data science, a compelling political narrative of America in the Sixties, a poignant collective biography of a generation of flawed men' David Kynaston'If Then is simultaneously gripping and absolutely terrifying' Amanda Foreman

If Then: How One Data Company Invented the Future

by Jill Lepore

Radio 4's Book of the WeekA Financial Times Book of the YearShortlisted for the 2020 Financial Times / McKinsey Business Book of the YearLonglisted for the National Book Award 'The story of the original data science hucksters of the 1960s is hilarious, scathing and sobering - what you might get if you crossed Mad Men with Theranos' David RuncimanThe Simulmatics Corporation, founded in 1959, mined data, targeted voters, accelerated news, manipulated consumers, destabilized politics, and disordered knowledge--decades before Facebook, Google, Amazon, and Cambridge Analytica. Silicon Valley likes to imagine it has no past but the scientists of Simulmatics are the long-dead grandfathers of Mark Zuckerberg and Elon Musk. Borrowing from psychological warfare, they used computers to predict and direct human behavior, deploying their "People Machine" from New York, Cambridge, and Saigon for clients that included John Kennedy's presidential campaign, the New York Times, Young & Rubicam, and, during the Vietnam War, the Department of Defence. In If Then, distinguished Harvard historian and New Yorker staff writer, Jill Lepore, unearths from the archives the almost unbelievable story of this long-vanished corporation, and of the women hidden behind it. In the 1950s and 1960s, Lepore argues, Simulmatics invented the future by building the machine in which the world now finds itself trapped and tormented, algorithm by algorithm.'A person can't help but feel inspired by the riveting intelligence and joyful curiosity of Jill Lepore. Knowing that there is a mind like hers in the world is a hope-inducing thing' George Saunders, Man Booker Prize-winning author of Lincoln in the Bardo'An authoritative account of the origins of data science, a compelling political narrative of America in the Sixties, a poignant collective biography of a generation of flawed men' David Kynaston'If Then is simultaneously gripping and absolutely terrifying' Amanda Foreman

If It's Smart, It's Vulnerable

by Mikko Hypponen

Reimagine the future of the internet All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we&’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It&’s Smart, It&’s Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It&’s Smart, It&’s Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

If Hemingway Wrote JavaScript

by Angus Croll

What if William Shakespeare were asked to generate the Fibonacci series or Jane Austen had to write a factorial program? In If Hemingway Wrote JavaScript, author Angus Croll imagines short JavaScript programs as written by famous wordsmiths. The result is a peculiar and charming combination of prose, poetry, and programming.The best authors are those who obsess about language—and the same goes for JavaScript developers. To master either craft, you must experiment with language to develop your own style, your own idioms, and your own expressions. To that end, If Hemingway Wrote JavaScript playfully bridges the worlds of programming and literature for the literary geek in all of us.Featuring original artwork by Miran Lipova?a.

IEEE Technology and Engineering Management Society Body of Knowledge (IEEE Press Series on Technology Management, Innovation, and Leadership)

by Gustavo Giannattasio Elif Kongar Marina Dabić Celia Desmond Michael Condry Sudeendra Koushik Roberto Saracco

IEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) IEEE TEMS Board of Directors-approved body of knowledge dedicated to technology and engineering management The IEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) establishes a set of common practices for technology and engineering management, acts as a reference for entrepreneurs, establishes a basis for future official certifications, and summarizes the literature on the management field in order to publish reference documentation for new initiatives. The editors have used a template approach with authors that instructed them on how to introduce their manuscript, how to organize the technology and area fundamentals, the managing approach, techniques and benefits, realistic examples that show the application of concepts, recommended best use (focusing on how to identify the most adequate approach to typical cases), with a summary and conclusion of each section, plus a list of references for further study. The book is structured according to the following area knowledge chapters: business analysis, technology adoption, innovation, entrepreneurship, project management, digital disruption, digital transformation of industry, data science and management, and ethics and legal issues. Specific topics covered include: Market requirement analysis, business analysis for governance planning, financial analysis, evaluation and control, and risk analysis of market opportunities Leading and managing working groups, optimizing group creation and evolution, enterprise agile governance, and leading agile organizations and working groups Marketing plans for new products and services, risk analysis and challenges for entrepreneurs, and procurement and collaboration Projects, portfolios and programs, economic constraints and roles, integration management and control of change, and project plan structure The IEEE Technology and Engineering Management Society Body of Knowledge (TEMSBOK) will appeal to engineers, graduates, and professionals who wish to prepare for challenges in initiatives using new technologies, as well as managers who are responsible for conducting business involving technology and engineering.

IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints

by Petr Jurčík Ricardo Severino Stefano Tennina Roberta Daidone Gianluca Dini Nuno Pereira Marco Tiloca Mélanie Bouroche Anis Koubâa Jan-Hinrich Hauer Mário Alves Eduardo Tovar

This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.

IE&EM 2019: Proceedings of the 25th International Conference on Industrial Engineering and Engineering Management 2019

by Chen-Fu Chien Ershi Qi Runliang Dou

This book records the new research findings and development in the field of industrial engineering and engineering management, and it will serve as the guidebook for the potential development in future. It gathers the accepted papers from the 25th International conference on Industrial Engineering and Engineering Management held at Anhui University of Technology in Maanshan during August 24-25, 2019. The aim of this conference was to provide a high-level international forum for experts, scholars and entrepreneurs at home and abroad to present the recent advances, new techniques and application, to promote discussion and interaction among academics, researchers and professionals to promote the developments and applications of the related theories and technologies in universities and enterprises, and to establish business or research relations to find global partners for future collaboration in the field of Industrial Engineering. It addresses diverse themes in smart manufacturing, artificial intelligence, ergonomics, simulation and modeling, quality and reliability, logistics engineering, data mining and other related fields. This timely book summarizes and promotes the latest achievements in the field of industrial engineering and related fields over the past year, proposing prospects and vision for the further development.

Idiots: Marriage, Motherhood, Milk & Mistakes

by Laura Clery

A fresh, hilarious, and relatable collection of essays about everything from motherhood and marriage to sobriety and work-life balance (or imbalance) from the nationally bestselling author of the &“honest, complicated&” (SheKnows) Idiot.TRIGGER WARNING: TORN EVERYTHING! In her first book, Idiot, bestselling author Laura Clery gave us mind-blowingly personal life stories about addiction, toxic relationships, and recovery—establishing herself as the preeminent voice of infinite conviction meets zero impulse control. Here she is two kids later asking, &“How did we get here?&” Sex. Sex is how we got here. Laura&’s life has changed a great deal since she wrote Idiot, but her hilarious candor has only increased with motherhood—plus she tells some of the stories she was too scared to tell in her first book (which is really saying something). In Idiots, Laura shares more than anyone ever asked for about: -Mucus plugs, vacuum extraction, and adult diapers -Dousing doulas, VagTime, and pelvic organ prolapse -Vaginismus, laxative overdose, and accidental lactivism -Placenta pills, mom brain, and vibrator manifestation -Nipple-twisting orgies and flinging a butt burrito in your doctor&’s face -ADHD, autism, postpartum depression, and the wisdom of a ninety-eight-year-old sage named Anne -Unsolicited dick, sexual assault, and sister-drugging -Stephen&’s cheating, Laura&’s cheating, fights, and forgiveness -Choosing love over fear and healing the world Laura does not hold back when it comes to sharing stories of screw-ups, triumphs, and learning from her mistakes. Whether she&’s crying into a diaper in a Whole Foods parking lot or desperately soliciting advice from a random elderly stranger (who has most certainly considered a restraining order), Laura is able to laugh at herself even during her worst moments—more important, she makes us laugh, cry, and feel less alone in the world.

Idiot: Life Stories from the Creator of Help Helen Smash

by Laura Clery

From YouTube star and Facebook Video sensation Laura Clery comes a collection of comedic essays in the vein of We Are Never Meeting in Real Life by Samantha Irby and You’ll Grow Out of It by Jessi Klein.Laura Clery makes a living by sharing inappropriate comedy sketches with millions of strangers on the Internet. She writes songs about her anatomy, talks trash about her one-eyed rescue pug, and sexually harasses her husband, Stephen. And it pays the bills! Now, in her first-ever book, Laura recounts how she went from being a dangerously impulsive, broke, unemployable, suicidal, cocaine-addicted narcissist, crippled by fear and hopping from one toxic romance to the next…to a more-happy-than-not, somewhat rational, meditating, vegan yogi with good credit, a great marriage, a fantastic career, and four unfortunate-looking rescue animals. Still, above all, Laura remains an amazingly talented, adorable, and vulnerable, self-described…Idiot. With her signature brand of offbeat, no-holds-barred humor, Idiot introduces you to a wildly original—and undeniably relatable—new voice.

Identity with Windows Server 2016: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016

by Vladimir Stefanovic Sasha Kranjac

Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam. Key Features Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742 Acquire skills to reduce IT costs and deliver more business value Enhance your existing skills through practice questions and mock tests Book Description MCSA: Windows Server 2016 certification is one of the most sought-after certifications for IT professionals, which includes working with Windows Server and performing administrative tasks around it. This book is aimed at the 70-742 certification and is part of Packt's three-book series on MCSA Windows Server 2016 certification, which covers Exam 70-740, Exam 70-741, and Exam 70-742. This exam guide covers the exam objectives for the 70-742 Identity with Windows Server 2016 exam. It starts with installing and configuring Active Directory Domain Services (AD DS), managing and maintaining AD DS objects and advanced configurations, configuring Group Policy, Active Directory Certificate Services, and Active Directory Federation Services and Rights Management. At the end of each chapter, convenient test questions will help you in preparing for the certification in a practical manner. By the end of this book, you will be able to develop the knowledge and skills needed to complete MCSA Exam 70-742: Identity with Windows Server 2016 with confidence. What you will learn Install, configure, and maintain Active Directory Domain Services (AD DS) Manage Active Directory Domain Services objects Configure and manage Active Directory Certificate Services Configure and manage Group Policy Design, implement, and configure Active Directory Federation Services Implement and configure Active Directory Rights Management Services Who this book is for This book primarily targets system administrators who are looking to gain knowledge about identity and access technologies with Windows Server 2016 and aiming to pass the 70-742 certification. This will also help infrastructure administrators who are looking to gain advanced knowledge and understanding of identity and access technologies with Windows Server 2016. Familiarity with the concepts such as Active Directory, DNS is assumed.

The Identity Theft Protection Guide

by Amanda Welsh

PROTECTION PREVENTION REPAIRIdentity theft is the fastest-growing category of crime in the United States today, and dealing with privacy and identity issues has become an essential part of life in our modern society. Each chapter in The Identity Theft Protection Guide contains a self-quiz to identify personal areas of concern, information to help you "take action," and more. This book shows you how to:* Minimize the risk of identity theft* React if your identity is stolen* Obtain and repair credit and insurance reports, and more* Deal with direct marketers, junk mailers, and telephone solicitors* Stop surveillance from GPS devices and cell-phone cameras* Keep your kids safe online* And much more!These valuable survival skills can no longer be considered optional--they are essential for life in today's society. Amanda Welsh's The Identity Theft Protection Guide is the most complete, authoritative, and easy-to-use resource on this crucial topic.

Identity Theft For Dummies

by Michael J. Arata Jr.

Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9. 9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim. Written by a veteran security professional, Identity Theft For Dummies gives you the tools to recognize what information is vulnerable, minimize your risk, stay safe online, and practice damage control if your identity is compromised. If you have a name, a date of birth, and a Social Security number, you're a potential victim; this book helps you recognize your risk and defend against identity thieves Explains what identity theft is, how it happens, and how to recognize if you have become a victim Shows how to protect your personal information, how to be discreet in public places, how to interpret your credit report, and why you should monitor your financial statements Helps you recognize risks you may not have considered, such as what you set at the curb on trash day Provides advice on how to clear your name if you are victimized Identity Theft For Dummies arms you to fight back against this growing threat.

Identity Theft and Fraud: Evaluating and Managing Risk (Critical Issues in Risk Management)

by Norm Archer Susan Sproule Yufei Yuan Ken Guo Junlian Xiang

Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a risk management approach. It outlines various strategies that can be easily implemented to help prevent identity theft and fraud. It addresses technical issues in a clear and uncomplicated way to help decision-makers at all levels understand the steps their businesses and organizations can take to mitigate identity theft and fraud risks. And it highlights the risks individuals face in this digital age. This book can help anyone – businesses and organizations of all sizes, as well as individuals – develop an identity theft and fraud prevention strategy that will reduce their risk and protect their identity assets. To date, little has been written on identity theft and fraud with a Canadian audience in mind. This book fills that gap, helping Canadians minimize their identity theft and fraud risks.

Identity Technologies

by Anna Poletti Julie Rak

"Identity Technologies "is a substantial contribution to the fields of autobiography studies, digital studies, and new media studies, exploring the many new modes of self-expression and self-fashioning that have arisen in conjunction with Web 2. 0, social networking, and the increasing saturation of wireless communication devices in everyday life. This volume explores the various ways that individuals construct their identities on the Internet and offers historical perspectives on ways that technologies intersect with identity creation. Bringing together scholarship about the construction of the self by new and established authors from the fields of digital media and auto/biography studies, "Identity Technologies "presents new case studies and fresh theoretical questions emphasizing the methodological challenges inherent in scholarly attempts to account for and analyze the rise of identity technologies. The collection also includes an interview with Lauren Berlant on her use of blogs as research and writing tools.

Identity, Pedagogy and Technology-enhanced Learning: Supporting the Processes of Becoming a Tradesperson (Professional and Practice-based Learning #27)

by Selena Chan

This book gathers work from over a decade of study, and seeks to better understand and support how learners become tradespeople. The research programme applies recent concepts from neuroscience, educational psychology and technology-enhanced learning to explain and help overcome the challenges of learning in trades-learning contexts. Due to the complex and multifarious nature of the work characterising trade occupations, learning how to become a tradesperson requires a significant commitment in terms of time, along with physical and cognitive effort. All modalities (visual, aural, haptic etc.) and literacies (text, numerical, spatial etc.) are required when undertaking trade work. Manual dexterity and strength, coupled with the technical and tacit knowledge required for complex problem solving, not to mention suitable dispositional approaches, must all be learnt and focused on becoming a tradesperson.However, there is a substantial gap in the literature on 'how people learn a trade' and 'how to teach a trade'. In this book, contemporary teaching and learning approaches and strategies, as derived through practice-based participatory research, are used to highlight and discuss pragmatic solutions to facilitate the learning and teaching of trade skills, knowledge and dispositions. The approaches and strategies discussed include the implementation of technology-enhanced learning; project-based inquiry/problem-based learning; and recommendations to ensure learners are prepared for the future of work.

Identity-Native Infrastructure Access Management

by Ev Kontsevoy Sakshyam Shah Peter Conrad

Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity.With this book, you'll learn:The four pillars of access: connectivity, authentication, authorization, and auditWhy every attack follows the same pattern, and how to make this threat impossibleHow to implement identity-based access across your entire infrastructure with digital certificatesWhy it's time for secret-based credentials to go awayHow to securely connect to remote resources including servers, databases, K8s Pods, and internal applications such as Jenkins and GitLabAuthentication and authorization methods for gaining access to and permission for using protected resources

Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication

by Lisa Bock

Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone involved in selecting, purchasing, integrating, or securing a biometric system. This book will help you understand how to select the right biometric system for your organization and walk you through the steps for implementing identity management and authentication. A basic understanding of biometric authentication techniques, such as fingerprint and facial recognition, and the importance of providing a secure method of authenticating an individual will help you make the most of the book.

Refine Search

Showing 29,026 through 29,050 of 53,443 results