Browse Results

Showing 36,401 through 36,500 of 53,642 results

International Joint Conference SOCO’16-CISIS’16-ICEUTE’16: San Sebastián, Spain, October 19th-21st, 2016 Proceedings (Advances in Intelligent Systems and Computing #527)

by Manuel Graña José Manuel López-Guede Oier Etxaniz Álvaro Herrero Héctor Quintián Emilio Corchado

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2016, CISIS 2016 and ICEUTE 2016, all conferences held in the beautiful and historic city of San Sebastián (Spain), in October 2016.Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena.After a through peer-review process, the 11th SOCO 2016 International Program Committee selected 45 papers. In this relevant edition a special emphasis was put on the organization of special sessions. Two special session was organized related to relevant topics as: Optimization, Modeling and Control Systems by Soft Computing and Soft Computing Methods in Manufacturing and Management Systems.The aim of the 9th CISIS 2016 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.After a through peer-review process, the CISIS 2016 International Program Committee selected 20 papers. In the case of 7th ICEUTE 2016, the International Program Committee selected 14 papers.

Crime and Intelligence Analysis: An Integrated Real-Time Approach

by Glenn Grana James Windell

Crime and Intelligence Analysis: An Integrated Real-Time Approach covers everything crime analysts and tactical analysts need to know to be successful. Providing an overview of the criminal justice system as well as the more fundamental areas of crime analysis, the book will enable students and law enforcement personnel to better understand criminal behavior, learn the basics of conducting temporal analysis of crime patterns, use spatial analysis to better understand crime, apply research methods to crime analysis, and more successfully evaluate data and information to help predict criminal offending and solve criminal cases. Criminal justice and police academy students will learn how to be skilled and credible crime analysts who play a critical role in the daily operations of law enforcement.

Legal Issues in Information Security

by Joanna Lyn Grama

Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. <p><p>Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Instructor Materials for Legal Issues in Information Security include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz & Exam Questions Case Scenarios/Handouts <p><p>New to the third Edition: • Includes discussions of amendments in several relevant federal and state laws and regulations since 2011 • Reviews relevant court decisions that have come to light since the publication of the first edition • Includes numerous information security data breaches highlighting new vulnerabilities

Parallel Algorithms in Computational Science and Engineering (Modeling and Simulation in Science, Engineering and Technology)

by Ananth Grama Ahmed H. Sameh

This contributed volume highlights two areas of fundamental interest in high-performance computing: core algorithms for important kernels and computationally demanding applications. The first few chapters explore algorithms, numerical techniques, and their parallel formulations for a variety of kernels that arise in applications. The rest of the volume focuses on state-of-the-art applications from diverse domains. By structuring the volume around these two areas, it presents a comprehensive view of the application landscape for high-performance computing, while also enabling readers to develop new applications using the kernels. Readers will learn how to choose the most suitable parallel algorithms for any given application, ensuring that theory and practicality are clearly connected. Applications using these techniques are illustrated in detail, including:Computational materials science and engineeringComputational cardiovascular analysisMultiscale analysis of wind turbines and turbomachineryWeather forecastingMachine learning techniquesParallel Algorithms in Computational Science and Engineering will be an ideal reference for applied mathematicians, engineers, computer scientists, and other researchers who utilize high-performance computing in their work.

Functional Coherence of Molecular Networks in Bioinformatics

by Ananth Grama Mehmet Koyutürk Shankar Subramaniam

Molecular networks provide descriptions of the organization of various biological processes, including cellular signaling, metabolism, and genetic regulation. Knowledge on molecular networks is commonly used for systems level analysis of biological function; research and method development in this area has grown tremendously in the past few years. This book will provide a detailed review of existing knowledge on the functional characterization of biological networks. In 15 chapters authored by an international group of prolific systems biology and bioinformatics researchers, it will organize, conceptualize, and summarize the existing core of research results and computational methods on understanding biological function from a network perspective.

Introduction to Parallel Computing (Second Edition)

by Ananth Grama Anshul Gupta George Karypis Vipin Kumar

Introducation to Parallel Computing is a complete end-to-end source of information on almost all aspects of parallel computing from introduction to architectures to programming paradigms to algorithms to programming standards. It covers traditional Computer Science algorithms, scientific computing algorithms, and data intensive algorithms.

History of Nordic Computing 4

by Christian Gram Per Rasmussen Søren Duus Østergaard

This book constitutes the refereed post-proceedings of the 4th IFIP WG 9. 7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e. g. , tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e. g. , banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e. g. , user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.

NOOK Tablet: Out of the Box

by Preston Gralla Brian Sawyer

<p>When you open the box for your brand-new NOOK Tablet, you'll find Barnes &amp; Noble's latest 7-inch media device to hit the market, a USB cable, power adapter, and a "Quick Start Guide" that tells you how to turn it on. But to really take advantage of all the content and features the device has to offer, you'll need a little more. NOOK Tablet: Out of the Box gets you up and running beyond the first "Slide to unlock" screen to unlock all of your media from the cloud in the palm of your hand.<br/><br/>\nThe new NOOK Tablet gives you immediate access to online music, movies, and the best of HD entertainment, wherever you are, as long as you know where to find it and how to consume it. With NOOK Tablet: Out of the Box, you'll jump right in to reading full-color magazines, newspapers, comics, interactive NOOK Kids books, beautiful PagePerfect titles, and your entire personal B&amp;N library in the NOOK Reading App. Then, go beyond your own media to experience integrated email, games, Android apps, and lightning-fast web browsing.<br/><br/>\nThis intuitive, easy-to-follow ebook opens the world of possibilities made possible by the NOOK Tablet, right out of the box.</p>

Windows XP Cookbook: Solutions and Examples for Power Users & Administrators

by Preston Gralla Robbie Allen

Each year, Windows XP is pre-installed on 30 million PCs sold in the U.S.--and 90 million worldwide--making it the world's most popular operating system, and proving to frustrated users everywhere that preponderance does not equate to ease of use. There are literally thousands of programs, tools, commands, screens, scripts, buttons, tabs, applets, menus, and settings contained within Windows XP. And it has only been in the last couple of years that Microsoft's documentation has actually been more of a help than a hindrance. But it still isn't enough. Windows XP users and administrators need a quick and easy way to find answers. Plenty of books go into detail about the theory behind a particular technology or application, but few go straight to the essentials for getting the job done. Windows XP Cookbook does just that, tackling the most common tasks needed to install, manage, and support Windows XP. Featuring a new twist to O'Reilly's proven Cookbook formula, this problem-solving guide offers multiple solutions for each of its 300-plus recipes. Solve dilemmas with the graphical user interface, the command line, through the Registry, or by using scripts. Each step-by-step recipe includes a discussion that explains how and why it works. The book is also among the first to cover Microsoft's XP Service Pack 2. With these practical, on-the-job solutions, Windows XP Cookbook will save you hours of time searching for answers. Windows XP Cookbook will be useful to anyone that has to use, deploy, administer, or automate Windows XP. But this isn't a typical end-user book; it covers the spectrum of topics involved with running Windows XP in both small and large environments. As a result, IT professionals and system administrators will find it a great day-to-day reference. And power users will find Windows XP Cookbook a great source for information on tweaking XP and getting the most out of their systems. The bottom line is that Windows XP Cookbook will make just about anyone who uses XP more productive.

Amazon Fire Phone: The Missing Manual

by Preston Gralla

Unleash the powers of the Amazon Fire phone with help from technology guru Preston Gralla. Through clear instructions and savvy advice, this fast-paced, engaging guide shows you how to make the most of Fire phone's innovative features--including Firefly, Dynamic Perspective, one-handed gestures, and integration with Amazon Prime.The important stuff you need to know:Gain control with Dynamic Perspective. Tilt your phone to scroll, move your head to play games, and explore maps in 3D.Take pictures further. Capture high-res, panoramic, and moving (lenticular) photos. Shoot HD video, too.Shop with ease. Use Firefly to identify music, videos, and other items, and go straight to the product's Amazon page.Get the apps you want. Load up on games and apps for productivity, health and fitness, and social networking from Amazon's Appstore.Solve problems right away. Get live tech support from Amazon via video chat with the Mayday help feature.Carry the Cloud in your hand. Access Prime Instant Video, your Kindle library, and your uploaded photos and videos.

Droid 2: The Missing Manual

by Preston Gralla

Ready to unleash the Droid 2? This entertaining guide helps you take full command of Motorola’s sleek new device to get online, shop, find locations, keep in touch, and much more. Every page is packed with useful information you can put to work right away, from setup to troubleshooting, with lots of valuable tips and tricks along the way.Get organized. Sync your contacts, calendar, and email with your Google Calendar and Outlook accounts.Go online. Make your phone a portable hotspot or a modem to get your laptop online.Be productive. Use Google docs to create and edit documents, spreadsheets, and presentations.Play music. Purchase music from Amazon and sync your Droid 2 with Windows Media Player.Capture photos and video. Edit your photos and share everything you shoot—instantly.

Droid X: The Missing Manual

by Preston Gralla

Get the most from your Droid X right away with this entertaining Missing Manual. Veteran tech author Preston Gralla offers a guided tour of every feature, with lots of expert tips and tricks along the way. You'll learn how to use calling and texting features, take and share photos, enjoy streaming music and video, and much more.Packed with full-color illustrations, this engaging book covers everything from getting started to advanced features and troubleshooting. Unleash the power of Motorola's hot new device with Droid X: The Missing Manual.Get organized. Import your contacts and sync with Google Calendar and Microsoft Exchange.Go online. Get your phone to act as a portable hotspot or as a modem to get your laptop online.Play music. Purchase music from Amazon and sync your Droid X with Windows Media Player and iTunes.Shoot photos and video. Edit and share your photos, and use them as desktop or icon images. Record video and share it with your friends.Connect to Google Maps. Use geotagging and get turn-by-turn directions.

Droid X2: The Missing Manual

by Preston Gralla

<p>Droid X2 has more power and better graphics than its predecessor, but it still doesn&#8217;t offer a printed guide to its amazing features. This Missing Manual helps you dig deep into everything Droid X2 can do. Learn how to shop, keep in touch, play with photos, listen to music, and even do some work. Unleash the power of this popular device with expert advice.</p>

Galaxy S II: The Missing Manual

by Preston Gralla

<p>Galaxy S II: The Missing Manual is the definitive guide to Samsung&#8217;s hottest and smartest new phone. Veteran author and Android expert Preston Gralla gives you a guided tour of every feature, with lots of expert tips and tricks along the way. With loads of illustrations and clear instructions, this book shows you how to call and text like a pro, take and share photos, enjoy streaming music and video, get turn-by-turn directions, and more.</p>

Galaxy S4: The Missing Manual

by Preston Gralla

Unlock the potential of Samsung's outstanding smartphone with this fully illustrated, jargon-free guide from technology guru Preston Gralla. You'll quickly learn how to shoot high-res photos and HD video, keep your schedule, stay in touch, and enjoy your favorite media. Every page is packed with illustrations and valuable advice to help you get the most from the smartest phone in town. The important stuff you need to know: Get dialed in. Learn your way around the Galaxy S4's calling and texting features. Go online. Browse the Web, manage email, and download apps with Galaxy S4's 4G LTE network (or create your own hotspot). Master your media. Shoot and share pictures and video, organize and play your music library--and send it wirelessly to your TV or stereo. Be entertained now. Start watching movies and TV shows while they're still loading. Explore the world. Get news and weather, find a location, and navigate by GPS. Check your schedule. Use the convenient calendar app, and sync it with your Google and Outlook calendars.

Galaxy S4: The Missing Manual

by Preston Gralla

Galaxy S4 is amazing right out of the box, but if you want to get the most of out your S4 or S4 Mini, start here. With clear instructions and savvy advice from technology expert Preston Gralla, you’ll learn how to go online, play games, listen to music, watch movies & TV, monitor your health, and answer calls with a wave of your hand.The important stuff you need to know:Be connected. Browse the Web, manage email, and download apps through WiFi or S4’s 3G/4G network.Navigate without touch. Use Air Gestures with your hand, or scroll with your eyes using Smart Screen.Find new ways to link up. Chat, videochat, and add photos, video, or entire slideshows to text messages.Get together with Group Play. Play games or share pictures, documents, and music with others nearby.Create amazing images. Shoot and edit photos and videos—and combine images from the front and back cameras.Keep music in the cloud. Use Google Play Music to store and access tunes.Check your schedule. Sync the S4 with your Google and Outlook calendars.

Galaxy Tab: Covers Samsung TouchWiz Interface (The\missing Manual Ser.)

by Preston Gralla

<p>Galaxy Tab lets you work, play, read, and connect on the go, but mastering its TouchWiz interface and finding the best apps can be tricky&#8212;unless you have this Missing Manual. Gadget whiz Preston Gralla provides crystal-clear explanations and step-by-step instructions to get you up to speed quickly, whether you have the 3G/4G or Wi-Fi version of this amazing device.</p>

How Intranets Work

by Preston Gralla

Now you can learn how intranets work, what they can and cannot do for your organization. This is a great beginner's guide to intranets.

Internet Annoyances

by Preston Gralla

What began as an intrepid U.S. Government initiative in the early 1970's has turned into a global way of life. Indeed, with more than 500 million current users (and counting), the Internet has revolutionized the way societies function the world over. From dating and shopping online, to conducting informational research, to communicating via email, today seemingly everyone uses the Internet for one purpose or another. How, then, can something so vast and powerful be defiled by something as trivial as spam? It's true. The fact remains that despite the leading-edge technological sophistication fueling the Net, there are still many related annoyances that complicate and tarnish the Internet experience. And it doesn't matter if you're a homemaker in search of a fresh chicken recipe, or a civil engineer researching plans for a new skyscraper, the problems are the same. Internet Annoyances understands the universal nature of the Internet and strives to make its use as stress-free as possible. This insightful guide shows you how to overcome the most annoying Internet-related quirks, bugs, and hassles. You'll learn how to make a seamless connection, thwart would-be hackers, ensure greater security while surfing, eliminate pop-up ads, maximize online services, conduct more effective Google searches, better utilize digital media (music and video), and much more. In addition, Internet Annoyances discusses how to design and host a personal web site something once thought of as only possible for the technically gifted. Topics like blogs, domain names, setup, HTML, fonts, and graphics and are all dissected and analyzed for easy consumption. Unlike other books on the subject, Internet Annoyances assumes readers already possess a working knowledge of the Internet. By fully recognizing the experience level of today's Internet culture, author Preston Galla is able to cut immediately to the chase and not waste time on the more obvious points. Internet Annoyances , therefore, is a quick read that presents succinct solutions for the many glitches that still populate the Internet experience.

Motorola Xoom: The Missing Manual

by Preston Gralla

Motorola Xoom is the first tablet to rival the iPad, and no wonder with all of the great features packed into this device. But learning how to use everything can be tricky--and Xoom doesn't come with a printed guide. That's where this Missing Manual comes in. Gadget expert Preston Gralla helps you master your Xoom with step-by-step instructions and clear explanations. As with all Missing Manuals, this book offers refreshing, jargon-free prose and informative illustrations. Use your Xoom as an e-book reader, music player, camcorder, and phone Keep in touch with email, video and text chat, and social networking apps Get the hottest Android apps and games on the market Do some work with Google Docs, Microsoft Office, or by connecting to a corporate network Tackle power-user tricks, such as barcode scanning, voice commands, and creating a Wi-Fi hotspot Sync your Xoom with a PC or a Mac

NOOK HD: The Missing Manual

by Preston Gralla

<p>You can do many things with NOOK HD right out of the box, but if you really want to get the most from your HD or HD+ tablet, start with this book. With clear instructions, full-color illustrations, and savvy advice from technology expert Preston Gralla, you&#8217;ll learn how to use email and the Web, watch movies and shows, play games, listen to music, and enjoy your personal ebook library.</p>

NOOK Tablet: The Missing Manual

by Preston Gralla

<p>Combine a world-class e-reader with a top-notch tablet&#8212;then add know-how from technology guru Preston Gralla&#8212;and you have the perfect recipe for portable entertainment. Packed with clear instructions and helpful illustrations, this book gets you up to speed on the NOOK Tablet so you can enjoy ebooks, magazines, games, apps, TV shows, and movies right away.</p>

PC Pest Control

by Preston Gralla

The Internet is rife with all kinds of creepy PC bugs. In the first six months of 2004, almost 5,000 new Windows viruses and worms were discovered that were capable of compromising computer security. But the pests that users deal with aren't limited to viruses. They're plagued with everything from spam to phishing. But just because your computer is hooked up to the Internet doesn't mean your PC has to be at risk. In a constant battle of one-upmanship, the forces of good have devised a number of creative ways to fend off these Internet nasties in order to best protect your computer. And PC Pest Control from O'Reilly spells out how you can do just that. Written in a friendly, engaging manner, this handy guide covers detection, prevention and cure, where you're vulnerable, and how to surf the web more safely. It also details how you can protect yourself against adware, spyware, home page hijackers, viruses, Trojans, spam, phishing attacks, and more. For easy understanding, PC Pest Control describes each problem and its symptoms, rates the danger level, and then shows you how to solve the problem step by step. In addition, a supporting website keeps the book's content as up to date as possible, so you're always informed of the latest safeguards. And in a field that shifts as frequently as PC protection, that's a major advantage. So if you want to make sure that your personal computer doesn't fall victim to attack-or if your system has already been infected and you want to start anew-then PC Pest Control is most definitely for you.

System Windows. Najlepsze rozwi?zania

by Preston Gralla

System Windows. Najlepsze rozwišzania Jak dopasowa? Windows do swoich potrzeb? Jak optymalnie zabezpieczy? komputer?Jak zwi?kszy? wydajno?? systemu Windows?Jak zbudowa? domowe centrum rozrywki? Systemu Windows nie trzeba nikomu przedstawia?. Warto jednak zobaczy?, jak mo?na go udoskonali? i dostosowa? do swoich potrzeb. Dzi?ki tej ksiš?ce poznasz szerokie spektrum oprogramowania -- zarówno wbudowanego, jak i zewn?trznego, wraz z instrukcjami u?ycia -- przeznaczonego do modyfikacji oraz personalizacji obecnie u?ywanych systemów Windows. Ksiš?ka "System Windows. Najlepsze rozwišzania" nie jest skierowana do tych, którzy oczekujš zwyk?ych porad i wskazówek mówišcych, gdzie nale?y kliknš?, gdzie przecišgnš? myszš i jakie polecenia wpisa?. To propozycja kreatywnych rozwišza?, dzi?ki którym ka?dy u?ytkownik b?dzie móg? dostosowa? ten system operacyjny i wszystkie aplikacje oraz sprz?t, na którym dzia?ajš, w celu podniesienia komfortu i wydajno?ci swojej pracy. Po przeczytaniu tej ksiš?ki samodzielnie skonfigurujesz interfejs Aero w systemie Vista i utworzysz w?asne gad?ety paska bocznego, po czym uruchomisz je z nap?du USB. Dzi?ki szczegó?owym instrukcjom i wskazówkom krok po kroku zastosujesz przedstawione tu sposoby na optymalizacj? pracy z Windows. Znajdziesz tu równie? porady dotyczšce przeglšdarki Internet Explorer i pakietu biurowego Office 2007 oraz sprz?tu, takiego jak Zune czy router bezprzewodowy. W ksiš?ce znajdziesz sposoby m. in. na: szybsze uruchamianie i zamykanie systemu,wyszukiwanie i zarzšdzanie plikami w Eksploratorze Windows,rozwišzywanie problemów z Internet Explorerem,k?opoty z sieciš,optymalizacj? poczty elektronicznej,zapewnianie bezpiecze?stwa i kontroli kont u?ytkowników,wykorzystanie grafiki i multimediów, podnoszenie wydajno?ci systemu.Uwolnij ca?y potencja? drzemišcy w systemie Windows!

Windows 8 Hacks: Tips & Tools for Unlocking the Power of Tablets and Desktops

by Preston Gralla

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the beginning. You’ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you’ll also discover why it works.Add folders and other objects to the Start screenRun other Windows versions inside Windows 8Juice up performance and track down bottlenecksUse the SkyDrive cloud service to sync your files everywhereSpeed up web browsing and use other PCs on your home networkSecure portable storage and set up a virtual private networkHack Windows 8 Mail and services such as OutlookCombine storage from different devices into one big virtual diskTake control of Window 8 setting with the Registry

Windows 8. Praktyczne rozwi?zania

by Preston Gralla

Ju? na pierwszy rzut oka Windows 8 zdecydowanie ró?ni si? od swoich poprzedników. Te ró?nice wci?? wzbudzaj? emocje, a u?ytkowników wp?dzaj? w zak?opotanie. Jednak pewna rzecz nie uleg?a zmianie - Windows 8 to wci?? system operacyjny, który mo?na zmodyfikowa? na wiele sposobów tak, aby dopasowa? go idealnie do swoich potrzeb.Dzi?ki tej ksi??ce poznasz tajniki systemu Windows 8 i dowiesz si?, jak usprawni? Twój system. Je?li post?pisz zgodnie z zawartymi tu wskazówkami, zauwa?ysz, ?e system szybciej si? uruchamia. Ponadto dowiesz si?, jak uruchomi? Windows 8 na komputerach spod znaku ugryzionego jab?ka oraz jak b?yskawicznie dosta? si? do najcz??ciej u?ywanych folderów. Twoj? ciekawo?? na pewno wzbudz? wskazówki po?wi?cone pracy w chmurze. Integracja z us?ug? SkyDrive to tylko jeden z punktów. Na koniec przekonasz si?, ?e Windows 8 mo?e by? jeszcze lepszym partnerem w zakresie sk?adowania i odtwarzania plików multimedialnych oraz zarz?dzania tymi plikami. Jest to obowi?zkowa lektura dla ka?dego nowego u?ytkownika systemu Windows 8.Si?gnij po t? ksi??k? i:poznaj zalety systemu Windows 8przekonaj si?, jak ?atwo mo?esz zwi?kszy? wydajno?? Twojego systemuzintegruj system z us?ugami w chmurzewykorzystaj potencja? systemu Windows 8! Poznaj moc ukryt? pod mask? Windows 8!

Windows Vista in a Nutshell

by Preston Gralla

Intended for experienced Windows users, this reference documents the settings and features in the new Vista graphical user interface and its accompanying Windows Explorer, Internet Explorer, Windows Mail, networks, security and performance tools, hardware, group policy, multimedia support, and registry. The author clarifies what has changed in Vista, notates the navigation path, describes what each option does, and highlights non-obvious features for the power user. Annotation ©2007 Book News, Inc. , Portland, OR (booknews. com)

Windows Vista. Leksykon kieszonkowy

by Preston Gralla

Podr?czny przewodnik po systemie Vista Przeglšd najwa?niejszych elementów systemu Zestawienie skrótów klawiaturowych Omówienie struktury rejestru systemowego System operacyjny Windows Vista -- najnowsza wersja najpopularniejszego systemu operacyjnego -- wkroczy? na rynek z rozmachem. Od dawna zapowiadany produkt firmy Microsoft szybko sta? si? przebojem w?ród u?ytkowników komputerów. Producent zaoferowa? kilka wersji ró?nišcych si? mo?liwo?ciami, jednak majšcych wiele wspólnego. Vista ma nowy, bardzo intuicyjny i wygodny interfejs u?ytkownika, jest stabilna, bezpieczna i doskonale sprawdza si? w sieci. Narz?dzia, znane u?ytkownikom poprzednich wersji Windows, zosta?y gruntownie przeprojektowane i dodano wiele nowych. Ksiš?ka "Windows Vista. Leksykon kieszonkowy" to zwi?z?y przewodnik po tym nowatorskim systemie operacyjnym. Znajdziesz w nim niezb?dne do pracy wiadomo?ci podane w zwartej i czytelnej postaci. Poznasz najwa?niejsze elementy systemu oraz narz?dzia i aplikacje, w jakie zosta? wyposa?ony. Przeczytasz o korzystaniu ze skrótów klawiaturowych, pracy w sieci, modyfikowaniu zawarto?ci rejestru, wyszukiwaniu plików i danych, drukowaniu i systemie plików. Dowiesz si? tak?e, jak korzysta? z wiersza polece?. Elementy Pulpitu Dyski, foldery i pliki Skróty klawiaturowe Konfigurowanie systemu za pomocš Panelu sterowania Przeszukiwanie plików i folderów Korzystanie z poczty elektronicznej i przeglšdarki Internet Explorer Konfiguracja po?šcze? sieciowych Administracja systemem Edycja rejestru Polecenia konsoli tekstowej Dzi?ki tej ksiš?ce szybko zaczniesz efektywnš prac? z systemem Windows Vista.

Windows Vista Pocket Reference: A Compact Guide to Windows Vista

by Preston Gralla

Windows Vista Pocket Reference is the ideal guide to setting up and navigating the basics of this new operating system, from the new user interface to networking, multimedia, security, and mobility. This pocket reference offers four sections that will familiarize readers with Vista quickly: Getting Started gives a crash course in using Windows Vista, including the user interface, handling files, folders, drives and search, and working with hardware. Networking, the Internet and Wireless offers a tour of Internet Explorer 7, a wireless networking guide, and how to set up and maintain home networks. Multimedia shows how to use the Media Center, Windows Media Player, and how to handle graphics and photos, podcasts and MP3 players. Security, Mobility, and Troubleshooting visits the security features, shows how to tune up Vista, troubleshoot problems, and use Vista with mobile devices.

Windows XP Hacks

by Preston Gralla

A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer. Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client. Written by Preston Gralla, the compact and affordable Windows XP Hacks, Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.

Windows XP Hacks

by Preston Gralla

A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as:securityweb browsingcontrolling the control panelremoving uninstallable XP componentspop-up adsYou'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks, Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.

Windows XP Hacks, 2nd Edition

by Preston Gralla

Completely revised and updated, this smart collection of insider tips and tricks covers the XP operating system from start to finish, including all the new features that come with Service Pack 2 (SP2). You'll also find timesaving hacks for security, file distribution, digital media, web browsing, and more. An ideal all-in-one resource for XP beginners, as well as more experienced power users.

Windows XP Power Hound

by Preston Gralla

Windows XP can be a great tool, but it is all too easy to trip over Windows XP's annoying traits more often than you leverage its productivity. Windows XP power-users troll online resources, documentation, and the expertise (or lucky finds) of friends for valuable tips and tricks--a keyboard shortcut here, an undocumented double-click there--to eliminate annoyances, save time, and take control of their Windows XP. But what if there was an easier way? This new book presents literally hundreds of problems and solutions, amazing power tips, cool tricks, and clever workarounds in one clearly organized, easy to use, and portable resource. Truly insightful and amusing, Windows XP Power Hound gives Windows XP users practical hints for everything from the desktop to Office programs to the registry, and includes documented (but little-known) tips as well as previously undocumented tricks. Windows XP Power Hound moves far beyond mere productivity and explores what's possible with Windows XP--including cool things you probably never thought of doing. An understanding of Windows XP basics will get the job done. But discovering the most useful I didn't know that! tips and shortcuts will make using Windows XP a far richer and less frustrating experience. The practical, concise format of Windows XP Power Hound makes it easy to dip into for a quick tip from time to time; the warm, jargon-free tone makes it easy to read cover to cover. Anyone who wants to smooth out Windows XP's speed bumps and get some serious speed to accelerate through the bottlenecks will find that even a handful of these useful, to-the-point tips will make Windows XP Power Hound worth its weight in chocolate.

An Introduction to Cyberpsychology (BPS Core Textbooks Series)

by Gráinne Kirwan, Irene Connolly, Hannah Barton, and Marion Palmer

An Introduction to Cyberpsychology provides a comprehensive introduction to this rapidly growing discipline. Fully updated in its second edition, the book encourages students to critically evaluate the psychology of online interactions and to develop appropriate research methodologies to complete their own work in this field.The book examines cyberpsychology and online research methodologies, social psychology in an online context, practical applications of cyberpsychology, and the psychological aspects of other technologies. This new edition has been carefully updated to include additional coverage of: Expanded content relating to major developments in the field and new content on gaming and screentime A new chapter examining the relationship between older adults and technology Cyberpsychology in focus feature boxes in each chapter that examine topics in depth Interviews with professionals working in fields relating to cyberpsychology Each chapter includes key terms and a glossary, content summaries, discussion questions, and recommended reading to guide further study.Supported by extensive online resources for students and instructors, this authoritative book is an essential core text for undergraduate modules in cyberpsychology, and an ideal primer for students of postgraduate programs in cyberpsychology.To view the additional student and instructor resources for this book, please visit bpscoretextbooks.routledge.com

The Geek Atlas

by John Graham-Cumming

The history of science is all around us, if you know where to look. With this unique traveler's guide, you'll learn about 128 destinations around the world where discoveries in science, mathematics, or technology occurred or is happening now. Travel to Munich to see the world's largest science museum, watch Foucault's pendulum swinging in Paris, ponder a descendant of Newton's apple tree at Trinity College, Cambridge, and more. Each site in The Geek Atlas focuses on discoveries or inventions, and includes information about the people and the science behind them. Full of interesting photos and illustrations, the book is organized geographically by country (by state within the U.S.), complete with latitudes and longitudes for GPS devices. Destinations include: Bletchley Park in the UK, where the Enigma code was broken The Alan Turing Memorial in Manchester, England The Horn Antenna in New Jersey, where the Big Bang theory was confirmed The National Cryptologic Museum in Fort Meade, Maryland The Trinity Test Site in New Mexico, where the first atomic bomb was exploded The Joint Genome Institute in Walnut Creek, California You won't find tedious, third-rate museums, or a tacky plaque stuck to a wall stating that "Professor X slept here." Every site in this book has real scientific, mathematical, or technological interest -- places guaranteed to make every geek's heart pound a little faster. Plan a trip with The Geek Atlas and make your own discoveries along the way.

The GNU Make Book

by John Graham-Cumming

<P>GNU make is the most widely used build automation tool, but it can be challenging to master and its terse language can be tough to parse for even experienced programmers. Those who run into difficulties face a long, involved struggle, often leaving unsolved problems behind and GNU make's vast potential untapped. <P>The GNU Make Book demystifies GNU make and shows you how to use its best features. You'll find a fast, thorough rundown of the basics of variables, rules, targets, and makefiles. Learn how to fix wastefully long build times and other common problems, and gain insight into more advanced capabilities, such as complex pattern rules. With this utterly pragmatic manual and cookbook, you'll make rapid progress toward becoming a more effective user. <P>You'll also learn how to: <br>–Master user-defined functions, variables, and path handling <br>–Weigh the pitfalls and advantages of GNU make parallelization <br>–Handle automatic dependency generation, rebuilding, and non-recursive make <br>–Modify the GNU make source and take advantage of the GNU Make Standard Library <br>–Create makefile assertions and debug makefiles <P>GNU make is known for being tricky to use, but it doesn't have to be. If you’re looking for a deeper understanding of this indispensable tool, you'll find The GNU Make Book to be an indispensable guide.

Cybercrime and Digital Deviance

by Roderick Graham 'Shawn Smith

Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Cybercrime and Digital Deviance

by Roderick S. Graham 'Shawn K. Smith

Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.

Techno-Resiliency in Education

by Rob Graham

This book formulates a greater understanding of how to enable a capacity for building social professional practice related to technology-enriched teaching and learning (TETL) specific, but not limited to, educational settings. This book comes at a time when many in education are struggling to provide a technology enriched learning experience for students who are entering classrooms with high expectations for such an experience. The focus on the protective factors and identified resilient professional practices, instead of on well documented and commonly cited risk factors and barriers that impede the effective integration of TETL, represents a distinguishing feature of this work. By attempting to better understand and document how two schools that were classified as resilient in their use of technology have been able to overcome risk factors (e. g. , budgetary constraints, a lack of resources, a lack of training, technological support issues), this book will offer the unique concept of techno-resiliency and some of its deeper insights and strategies.

Mastering AutoCAD Civil 3D 2012

by Richard Graham Louisa Holland

A complete, detailed reference and tutorial for AutoCAD Civil 3DAutodesk's Civil 3D is the industry-leading civil engineering software, and this authoritative Autodesk Official Training Guide has been completely revised and modernized to offer you a fresh perspective on this powerful engineering package. Packed with new examples, new datasets, and new tutorials, this book shows how elements of the dynamic engineering program work together and discusses the best methods for creating, editing, displaying, and labeling all of a civil engineering project's elements.The book features in-depth, detailed coverage of surveying, points, alignments, surfaces, profiles, corridors, grading, LandXML and LDT Project Transfer, cross sections, pipe networks, visualization, sheets, and project management as well as Vault and data shortcuts. Practical tutorials, tips, tricks, real-world examples and easy-to-follow explanations detail all aspects of a civil engineering project. This Mastering book is recommended as a Certification Preparation study guide resource for the Civil 3D Associate and Professional exams. Features in-depth, detailed coverage of AutoCAD Civil 3D, the enormously popular civil engineering softwareShows how elements of the dynamic engineering program work together and discusses the best methods for creating, editing, displaying, and labeling all of a civil engineering project's elementsShares straightforward explanations, real-world examples, and practice tutorials on surveying, points, alignments, surfaces, profiles, corridors, grading, and much moreIn addition to teaching you vital Civil 3D tips, tricks, and techniques, Mastering AutoCAD Civil 3D will also help you prepare for the Civil 3D 2011 Certified Associate and Certified Professional exams.

Hackers & Painters: Big Ideas from the Computer Age

by Paul Graham

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet. Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West." The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.

Google Apps Meets Common Core

by Michael J. Graham

Your all-in-one solution to college and career readiness in the 21st century! Transform your classroom into a 21st century learning lab for college and career ready students! With step-by-step instructions and numerous screen shots for a variety of Google apps, you’ll learn how to meet and exceed Common Core standards with Google’s suite of free, easy-to-use educational tools. This book includes: Detailed instructions for integrating Common Core technology standards into your curriculum Sample lesson plans and correlations for elementary, middle school, and high school Links to training videos, websites, student samples, and interviews with Google Apps for Education users

Digital Economies at Global Margins (International Development Research Centre)

by Mark Graham

Investigations of what increasing digital connectivity and the digitalization of the economy mean for people and places at the world's economic margins.Within the last decade, more than one billion people became new Internet users. Once, digital connectivity was confined to economically prosperous parts of the world; now Internet users make up a majority of the world's population. In this book, contributors from a range of disciplines and locations investigate the impact of increased digital connectivity on people and places at the world's economic margins. Does the advent of a digitalized economy mean that those in economic peripheries can transcend spatial, organizational, social, and political constraints—or do digital tools and techniques tend to reinforce existing inequalities?The contributors present a diverse set of case studies, reporting on digitalization in countries ranging from Chile to Kenya to the Philippines, and develop a broad range of theoretical positions. They consider, among other things, data-driven disintermediation, women's economic empowerment and gendered power relations, digital humanitarianism and philanthropic capitalism, the spread of innovation hubs, and two cases of the reversal of core and periphery in digital innovation.ContributorsNiels Beerepoot, Ryan Burns, Jenna Burrell, Julie Yujie Chen, Peter Dannenberg, Uwe Deichmann, Jonathan Donner, Christopher Foster, Mark Graham, Nicolas Friederici, Hernan Galperin, Catrihel Greppi, Anita Gurumurthy, Isis Hjorth, Lilly Irani, Molly Jackman, Calestous Juma, Dorothea Kleine, Madlen Krone, Vili Lehdonvirta, Chris Locke, Silvia Masiero, Hannah McCarrick,Deepak K. Mishra, Bitange Ndemo, Jorien Oprins, Elisa Oreglia, Stefan Ouma, Robert Pepper, Jack Linchuan Qiu, Julian Stenmanns, Tim Unwin, Julia Verne, Timothy Waema

Ethical Hacking: A Hands-on Introduction to Breaking In

by Daniel Graham

A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you&’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You&’ll begin with the basics: capturing a victim&’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you&’ll deploy reverse shells that let you remotely run commands on a victim&’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you&’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you&’ll use to traverse a private network. You&’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework&’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim&’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you&’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you&’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.

An Internet in Your Head: A New Paradigm for How the Brain Works

by Daniel Graham

Whether we realize it or not, we think of our brains as computers. In neuroscience, the metaphor of the brain as a computer has defined the field for much of the modern era. But as neuroscientists increasingly reevaluate their assumptions about how brains work, we need a new metaphor to help us ask better questions.The computational neuroscientist Daniel Graham offers an innovative paradigm for understanding the brain. He argues that the brain is not like a single computer—it is a communication system, like the internet. Both are networks whose power comes from their flexibility and reliability. The brain and the internet both must route signals throughout their systems, requiring protocols to direct messages from just about any point to any other. But we do not yet understand how the brain manages the dynamic flow of information across its entire network. The internet metaphor can help neuroscience unravel the brain’s routing mechanisms by focusing attention on shared design principles and communication strategies that emerge from parallel challenges. Highlighting similarities between brain connectivity and the architecture of the internet can open new avenues of research and help unlock the brain’s deepest secrets.An Internet in Your Head presents a clear-eyed and engaging tour of brain science as it stands today and where the new paradigm might take it next. It offers anyone with an interest in brains a transformative new way to conceptualize what goes on inside our heads.

Conducting Research in Online and Blended Learning Environments: New Pedagogical Frontiers

by Charles R. Graham Anthony G. Picciano Charles D. Dziuban Patsy D. Moskal

Conducting Research in Online and Blended Learning Environments examines various perspectives, issues, and methods for conducting research in online and blended learning environments. The book provides in-depth examinations of the perspectives and issues that anyone considering research in online or blended learning will find insightful as they plan their own inquiries. Grounded in educational research theory, this is invaluable to both the serious researcher as well as the occasional evaluator. Conducting Research in Online and Blended Learning Environments provides comprehensive, useful information on research paradigms, methodologies, and methods that should be considered in designing and conducting studies in this area. Examples of the most respected research in the field enhance each chapter’s presentation.

Blended Learning for Inclusive and Quality Higher Education in Asia

by Charles R. Graham Cher Ping Lim

This book demonstrates how blended learning improves access to and enhances the quality of higher education teaching and learning in Asian universities. It first discusses how leading universities in the region drive and support blended learning at the institutional level to enhance student learning engagement and outcomes. It then examines 10 effective implementations and lessons learned of blended learning practices across different disciplinary courses and programmes (humanities and language, science and engineering, social science and education, and others) in the region. The chapters in this book provide an overview of the opportunities and challenges of blended learning for improved access and enhanced quality of higher education, and offer insights into the promising blended learning policies and practices in Asian universities.

Power Up Your PowToon Studio Project

by Bruce Graham

Whether you are a beginner wanting to learn from a professional or a seasoned user looking for a refresher, this is the book for you.

Secure Coding: Principles & Practices

by Mark G. Graff Kenneth R. Van Wyk

Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles & Practices looks at the problem of bad code in a new way. This concise and highly readable book is packed with advice based on the authors' decades of experience in the computer security field.

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat

by Garrett M. Graff John P. Carlin

The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us. In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.

Beginning OpenVPN 2.0.9

by Norbert Graf Markus Feilner

This book is an easy introduction to OpenVPN. While providing only necessary theoretical background, it takes a practical approach, presenting plenty of examples. It is written in a friendly style making this complex topic easy and a joy to read. It first covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before covering advanced uses of OpenVPN. This book is for both experienced and new OpenVPN users. If you are interested in security and privacy in the internet, or want to have your notebook or mobile phone connected safely to the internet, the server in your company, or at home, you will find this book useful. It presumes basic knowledge of Linux, but no knowledge of VPNs is required.

Building Dynamic Web 2.0 Websites with Ruby on Rails

by Hagen Graf

This book takes the reader through the tasks essential to create a Joomla! website as rapidly as possible. The necessary tasks are explained with clear step-by-step instructions. The authors chatty and engaging style makes this book very readable. This book is suitable for web developers, designers, webmasters, content editors, and marketing professionals who want to develop a website in a simple and straightforward process. It does not require any detailed knowledge of programming or web development, and any IT-confident individual will be able to use the book to produce an impressive website.

Building Websites with Joomla!

by Hagen Graf

This book focuses on taking you through the essential tasks to create a Joomla! site as fast as possible. These essential tasks are explained clearly, with well structured step-by-step instructions. The book does not aim to cover every feature of Joomla! nor is it a comprehensive guide to extending Joomla!. Almost everything in the book is accomplished without recourse to the underlying PHP code in which Joomla! is written. The book is very readable and the author has a particularly chatty and engaging writing style. This book is suitable for web developers, designers, webmasters, content editors and marketing professionals who want develop a fully featured web presence in a simple and straightforward process. It does not require any detailed knowledge of programming or web development, and any IT confident individual will be able to use the book to produce an impressive web site.

Building Websites with Joomla! v1.0

by Hagen Graf

This book focuses on taking you through the essential tasks to create a Joomla! site as fast as possible. These essential tasks are explained clearly, with well structured step-by-step instructions. The book does not aim to cover every feature of Joomla! nor is it a comprehensive guide to extending Joomla!. Almost everything in the book is accomplished without recourse to the underlying PHP code in which Joomla! is written. The book is very readable and the author has a particularly chatty and engaging writing style. This book is suitable for web developers, designers, webmasters, content editors and marketing professionals who want develop a fully featured web presence in a simple and straightforward process. It does not require any detailed knowledge of programming or web development, and any IT confident individual will be able to use the book to produce an impressive web site.

Building Websites with Mambo

by Hagen Graf

This book focuses on taking you through the essential tasks to create a Mambo site as fast as possible. These essential tasks are explained clearly, with well structured step by step instructions. The book does not aim to cover every feature of Mambo, nor is it a comprehensive guide to extending Mambo. Almost everything in the book is accomplished without recourse to the underlying PHP code in which Mambo is written. The book is very readable and the author has a particularly chatty and engaging writing style. This book is suitable for web developers, designers, webmasters, content editors and marketing professionals who want develop a fully featured web presence in a simple and straightforward process. It does not require any detailed knowledge of programming or web development, and any IT confident individual will be able to use the book to produce an impressive web site.

Discrete Calculus

by Leo J. Grady Jonathan R. Polimeni

The field of discrete calculus, also known as "discrete exterior calculus", focuses on finding a proper set of definitions and differential operators that make it possible to operate the machinery of multivariate calculus on a finite, discrete space. In contrast to traditional goals of finding an accurate discretization of conventional multivariate calculus, discrete calculus establishes a separate, equivalent calculus that operates purely in the discrete space without any reference to an underlying continuous process. This unique text brings together into a single framework current research in the three areas of discrete calculus, complex networks, and algorithmic content extraction. Although there have been a few intersections in the literature between these disciplines, they have developed largely independently of one another, yet researchers working in any one of these three areas can strongly benefit from the tools and techniques being used in the others. Many example applications from several fields of computational science are provided to demonstrate the usefulness of this framework to a broad range of problems. Readers are assumed to be familiar with the basics of vector calculus, graph theory, and linear algebra. Topics and features: presents a thorough review of discrete calculus, with a focus on key concepts required for successful application; unifies many standard image processing algorithms into a common framework for viewing a wide variety of standard algorithms in filtering, clustering, and manifold learning that may be applied to processing data associated with a graph or network; explains how discrete calculus provides a natural definition of "low-frequency" on a graph, which then yields filtering and denoising algorithms; discusses how filtering algorithms can give rise to clustering algorithms, which can be used to develop manifold learning and data discovery methods; examines ranking algorithms, as well as algorithms for analyzing the structure of a network. Graduate students and researchers interested in discrete calculus, complex networks, image processing and computer graphics will find this text/reference a clear introduction to the foundations of discrete calculus as well as a useful guide to have readily available for their work. Dr. Leo J. Grady is a Senior Research Scientist with Siemens Corporate Research in Princeton, New Jersey, USA. Dr. Jonathan R. Polimeni is a Research Fellow at the Massachusetts General Hospital in Boston, Massachusetts, USA, and Instructor in Radiology at Harvard Medical School, Boston, Massachusetts, USA.

Processing 2: Creative Coding Hotshot

by Nikolaus Gradwohl

Using a project-based approach, you will be able to learn the coolest aspects of working with Processing. Each project contains step-by-step explanations, diagrams, screenshots, and downloadable material to make learning Processing even easier.This book targets Processing developers ,visual artists, creative professionals, and students who want to move to the next level of learning Processing for gaining inspiration, work, or just for fun. The book assumes a basic understanding of programming. However, this book is also recommended to non-artistic readers, looking to expand their graphics and develop their creativity.

The Freelance Bible: Everything You Need to Go Solo in Any Industry

by Alison Grade

'Finally! The book that millions of people have been crying out for. An empowering guide of how to use your work to achieve independence, inspiration and - crucially - balance' Bruce Daisley, author of The Joy of Work and VP,TwitterYou want to go freelance. You want to make your career work for you, on your terms and determined by your own definition of success. You want autonomy, flexibility and variety.But where do you start?In The Freelance Bible, award-winning entrepreneur and freelancer, Alison Grade, guides you through absolutely everything that you need to know to start your successful self-employed life.Starting from day one, she will help you develop your personal brand, pick up the financial essentials, grow your client base, manage your work-life balance, negotiate deals and value your time as you become more established. This is your complete guide to turning your talent into a fulfilling and sustainable career.'Alison strikes an excellent and inspirational balance; sharing tips and advice that help you work out how to be secure in insecurity and ace the journey to becoming a freelancer' Alex Mahon CEO, Channel 4

Enjoying Natural Computing: Essays Dedicated to Mario de Jesús Pérez-Jiménez on the Occasion of His 70th Birthday (Lecture Notes in Computer Science #11270)

by Carmen Graciani Agustín Riscos-Núñez Gheorghe Păun Grzegorz Rozenberg Arto Salomaa

This Festschrift is in honor of Mario de Jesús Pérez-Jiménez, Professor in the Department of Computer Science of University of Seville, Spain, on the occasion of his 70th birthday. The title of this volume reflects both his main research area, viz., Natural Computing, and the guiding principle of his functioning: “once you choose to do something, enjoy doing it".The respect that Professor Mario de Jesús Pérez-Jiménez enjoys in the scientific community was well demonstrated by the enthusiastic response received to the request to contribute to this book. The contributions by more than 70 authors from 15 countries cover a wide spectrum of research areas and reflect well the broad range of research interests of Professor Mario de Jesús Pérez-Jiménez. The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, workbench for biocomputing, reaction systems, entropy of computation, rewriting systems, and insertion-deletion systems.

Algorithms and Architectures for Parallel Processing: ICA3PP 2016 Collocated Workshops: SCDT, TAPEMS, BigTrust, UCER, DLMCS, Granada, Spain, December 14-16, 2016, Proceedings (Lecture Notes in Computer Science #10049)

by José Gracia Josef Weidendorfer Jesus Carretero Javier Garcia-Blas Victor Gergel Vladimir Voevodin Iosif Meyerov Juan A. Rico-Gallego Juan C. Díaz-Martín Pedro Alonso Juan Durillo José Daniel Garcia Sánchez Alexey L. Lastovetsky Fabrizio Marozzo Qin Liu Zakirul Alam Bhuiyan Karl Fürlinger

This book constitutes the refereed workshop proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers presented were carefully reviewed and selected from 58 submissions. They cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems trying to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology.

Love and Electronic Affection: A Design Primer

by Lindsay D. Grace

Love and Electronic Affection: A Design Primer brings together thought leadership in romance and affection games to explain the past, present, and possible future of affection play in games. The authors apply a combination of game analysis and design experience in affection play for both digital and analog games. The research and recommendations are intersectional in nature, considering how love and affection in games is a product of both player and designer age, race, class, gender, and more. The book combines game studies with game design to offer a foundation for incorporating affection into playable experiences. The text is organized into two sections. The first section covers the patterns and practice of love and affection in games, explaining the patterns and practice. The second section offers case studies from which designers can learn through example. Love and Electronic Affection: A Design Primer is a resource for exploring how digital relationships are offered and how to convey emotion and depth in a variety of virtual worlds. This book provides: • A catalog of existing digital and analog games for which love and affection are a primary or secondary focus. • A catalog of the uses of affection in games, to add depth and investment in both human-computer and player-to-player engagement. • Perspective on affection game analyses and design, using case studies that consider the relationship of culture and affection as portrayed in games from large scale studios to single author independent games. • Analysis and design recommendations for incorporating affection in games beyond romance, toward parental love, affection between friends, and other relationships. • Analysis of the moral and philosophical considerations for historical and planned development of love and affection in human–computer interaction. • An intersectionality informed set of scholarly perspectives from the Americas, Eurasia, and Oceania. Editor Bio: Lindsay D. Grace is Knight Chair of Interactive Media and an Associate Professor at the University of Miami School of Communication. He is Vice President for the Higher Education Video Game Alliance and the 2019 recipient of the Games for Change Vanguard award. Lindsay is author of Doing Things with Games, Social Impact through Design and more than fifty peer-reviewed papers on games and related research. He has given talks at the Game Developers Conference, SXSW, Games for Change Festival, the Online News Association, the Society for News Design, and many other industry events. He was the founding director of the American University Game Lab and Studio and the designer-developer behind several award winning games, including two affection games. He served as Vice President and on the board of directors for the Global Game Jam™ non-profit between 2014 and 2019. From 2009 to 2013 he was the Armstrong Professor at Miami University’s School of Art. Lindsay also served on the board for the Digital Games Research Association (DiGRA) between 2013 and 2015.

Doing Things with Games: Social Impact Through Play

by Lindsay Grace

The book provides a contemporary foundation in designing social impact games. It is structured in 3 parts: understanding, application, and implementation. The book serves as a guide to designing social impact games, particularly focused on the needs of, media professionals, indie game designers and college students. It serves as a guide for people looking to create social impact play, informed by heuristics in game design. Key Features Provides contemporary guide on the use of games to create social impact for beginner to intermediate practitioners o Provides design and implementation strategies for social impact games Provides wide ranging case studies in social impact games Provides professional advice from multiple social impact industry practitioners via sidebar interviews, quotes, and postmortems Provides a quick start guide on creating a variety of social impact engagements across a wide variety of subjects and aims

AutoCAD For Dummies

by Ralph Grabowski

You’re one step away from creating crystal-clear computer-aided drafts in AutoCAD Ever started an AutoCAD project, only to give up when you couldn’t quite get the hang of it? Or do you have a project coming up that would really benefit from a few meticulously created drawings? Then you need the latest edition of AutoCAD For Dummies, the world’s bestselling retail book about the wildly popular program. With coverage of all the important updates to AutoCAD released since 2019, this book walks you through the very basics of pixels, vectors, lines, text, and more, before moving on to more advanced step-by-step tutorials on three-dimensional drawings and models. Already know the fundamentals? Then skip right to the part you need! From blocks to parametrics, it’s all right here at your fingertips. You’ll also find: In-depth explanations of how to create and store your drawings on the web Stepwise instructions on creating your very first AutoCAD drawing, from product installation and project creation to the final touches An exploration of system variables you can tweak to get the best performance from AutoCAD Perfect for the AutoCAD newbie just trying to find their way around the interface for the first time, AutoCAD For Dummies is also a must-read reference for the experienced user looking to get acquainted with the program’s latest features and essential drawing tips. Grab a copy today!

Virtual Reality and Virtual Environments: A Tool for Improving Occupational Safety and Health (Occupational Safety, Health, and Ergonomics)

by Andrzej Grabowski

Virtual reality (VR) techniques are becoming increasingly popular. The use of computer modeling and visualization is no longer uncommon in the area of ergonomics and occupational health and safety. This book explains how studies conducted in a simulated virtual world are making it possible to test new solutions for designed workstations, offering a high degree of ease for introducing modifications and eliminating risk and work-related accidents. Virtual reality techniques offer a wide range of possibilities including increasing the cognitive abilities of the elderly, adapting workstations for people with disabilities and special needs, and remote control of machines using collaborative robots.Detailed discussions include: Testing protective devices, safety systems, and the numerical reconstruction of work accidents Using computer simulation in generic virtual environments On the one hand, it is a self-study book made so by well-crafted and numerous examples. On the other hand, through a detailed analysis of the virtual reality from a point of view of work safety and ergonomics and health improvement. Ewa Grabska, Jagiellonian University, Kraków, PolandNoteworthy is the broad scope and diversity of the addressed problems, ranging from training employees using VR environments with different degrees of perceived reality; training and rehabilitation of the elderly; to designing, testing, modifying, and adapting workplaces to various needs including those of disabled workers; to simulation and investigation of the cause of accidents at a workplace.Andrzej Krawiecki, Warsaw University of Technology, Warsaw, Poland

The Practice of Enterprise Modeling: 13th IFIP Working Conference, PoEM 2020, Riga, Latvia, November 25–27, 2020, Proceedings (Lecture Notes in Business Information Processing #400)

by Jānis Grabis Dominik Bork

This book constitutes the proceedings papers of the 13th IFIP Working Conference on the Practice of Enterprise Modeling, held in Riga, Latvia, in November 2020. Due to the COVID-19 pandemic the conference took place virtually. The 19 full papers presented together with 7 short and 2 invited papers in this volume were carefully reviewed and selected from a total of 58 submissions to the main conference. The special focus of PoEM 2020 is on the role of enterprise modelling in the digital age. The selected papers are grouped by the following topics: Enterprise Modeling and Enterprise Architecture, Formal Aspects of Enterprise Modelling, Foundations and Applications of Enterprise Modeling, Enterprise Ontologies, Business Process Modeling, Risk and Security Modeling, Requirements Modeling, and Process Mining.

Writing Community Change: Designing Technologies for Citizen Action

by Jeffrey T. Grabill

A book on writing for community change by use of information technology.

Mixed Messages: Mediating Native Belonging in Asian Russia

by Kathryn E. Graber

Focusing on language and media in Asian Russia, particularly in Buryat territories, Mixed Messages engages debates about the role of minority media in society, alternative visions of modernity, and the impact of media on everyday language use. Graber demonstrates that language and the production, circulation, and consumption of media are practices by which residents of the region perform and negotiate competing possible identities. What languages should be used in newspapers, magazines, or radio and television broadcasts? Who should produce them? What kinds of publics are and are not possible through media? How exactly do discourses move into, out of, and through the media to affect everyday social practices? Mixed Messages addresses these questions through a rich ethnography of the Russian Federation's Buryat territories, a multilingual and multiethnic region on the Mongolian border with a complex relationship to both Europe and Asia.Mixed Messages shows that belonging in Asian Russia is a dynamic process that one cannot capture analytically by using straightforward categories of ethnolinguistic identity.

Criar humanos en un entorno digital: Cómo ayudar a los niños a tener una relación sana con la tecnología

by Diana Graber

Sexting, cyberbullying, la venganza del porno, depredadores en línea... todas estas amenazas potenciales pueden tentar a los padres a arrebatar de las manos de sus hijos, el teléfono inteligente o la tableta. Si bien la privación puede eliminar los peligros, ese enfoque también significa que su hijo se pierde los muchos beneficios y oportunidades de la tecnología.Criando humanos en un mundo digital muestra cómo los niños digitales deben aprender a navegar por este entorno, desde el equilibrio de la vida real y virtual hasta convertirse en modelos positivos y líderes.Este libro está lleno de temas de discusión en el hogar y actividades divertidas que cualquier familia ocupada puede realizar en su rutina diaria. Con una serie de consejos prácticos basados en la investigación académica y la experiencia práctica, los padres de hoy finalmente tienen lo que han estado esperando: una guía para criar niños digitales que se convertirán en los líderes positivos y exitosos que nuestro mundo necesita desesperadamente.

Criar humanos en un entorno digital: Cómo ayudar a los niños a tener una relación sana con la tecnología

by Diana Graber

Sexting, cyberbullying, la venganza del porno, depredadores en línea... todas estas amenazas potenciales pueden tentar a los padres a arrebatar de las manos de sus hijos, el teléfono inteligente o la tableta. Si bien la privación puede eliminar los peligros, ese enfoque también significa que su hijo se pierde los muchos beneficios y oportunidades de la tecnología.Criando humanos en un mundo digital muestra cómo los niños digitales deben aprender a navegar por este entorno, desde el equilibrio de la vida real y virtual hasta convertirse en modelos positivos y líderes.Este libro está lleno de temas de discusión en el hogar y actividades divertidas que cualquier familia ocupada puede realizar en su rutina diaria. Con una serie de consejos prácticos basados en la investigación académica y la experiencia práctica, los padres de hoy finalmente tienen lo que han estado esperando: una guía para criar niños digitales que se convertirán en los líderes positivos y exitosos que nuestro mundo necesita desesperadamente.Raising Humans in a Digital WorldSexting, cyberbullying, revenge porn, online predators… all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children&’s hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology&’s many benefits and opportunities.Raising Humans in a Digital World shows how digital kids must learn to navigate this environment, throughdeveloping social-emotional skillsbalancing virtual and real lifebuilding safe and healthy relationshipsavoiding cyberbullies and online predatorsprotecting personal informationidentifying and avoiding fake news and questionable contentbecoming positive role models and leaders.This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine. Full of practical tips grounded in academic research and hands-on experience, today&’s parents finally have what they&’ve been waiting for—a guide to raising digital kids who will become the positive and successful leaders our world desperately needs.

Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology

by Diana Graber

The Internet can be a scary, dangerous place especially for children. This book shows parents how to help digital kids navigate this environment.Sexting, cyberbullying, revenge porn, online predators…all of these potential threats can tempt parents to snatch the smartphone or tablet out of their children&’s hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology&’s many benefits and opportunities.In Raising Humans in a Digital World, digital literacy educator Diana Graber shows how children must learn to handle the digital space through:developing social-emotional skillsbalancing virtual and real lifebuilding safe and healthy relationshipsavoiding cyberbullies and online predatorsprotecting personal informationidentifying and avoiding fake news and questionable contentbecoming positive role models and leadersRaising Humans in a Digital World is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine.Full of practical tips grounded in academic research and hands-on experience, today&’s parents finally have what they&’ve been waiting for—a guide to raising digital kids who will become the positive and successful leaders our world desperately needs.

An Introduction to Network Programming with Java: Java 7 Compatible

by Jan Graba

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the Java libraries have been updated to keep up with the new developments in network technology, so that the Java programming language continues to be one of the mainstays of network software development. In providing a very readable text that avoids getting immersed in low-level technical details, while still providing a useful, practical guide to network programming for both undergraduates and busy IT professionals, this third edition continues the trend of its predecessors. To retain its currency, the text has been updated to reflect changes that have taken place in Java's network technology over the past seven years (including the release of Java 7), whilst retaining its notable features of numerous code examples, screenshots and end-of-chapter exercises.

Smart Cyber Physical Systems: Advances, Challenges and Opportunities

by G.R. Karpagam, B. Vinoth Kumar, J. Uma Maheswari and Xiao-Zhi Gao

Smart Cyber Physical Systems: Advances, Challenges and Opportunities ISBN: 9780367337889 Cyber Physical Systems (CPS) are the new generation of collaborative computational entities, with a prime focus on integration of the physical world and cyber space. Through a feedback mechanism, the system adapts itself to new conditions in real time. The scope of this book includes research experience by experts in CPS infrastructure systems, incorporating sustainability by embedding computing and communication in day-to-day applications. CPS, integrated with Blockchain, Artificial Intelligence, Internet of Things, Big Data, Cloud Computing and Communication, lay a foundation for the fourth industrial revolution, Industry 4.0. This book will be of immense use to practitioners in industries with a focus on autonomous and adaptive configuration, and on optimization, leading to increased agility, elasticity and cost effectiveness. The contributors of this book include renowned academics, industry practitioners and researchers. It offers a rigorous introduction to the theoretical foundations, techniques and practical solutions, through case studies. Building CPS with effective communication, control, intelligence and security is discussed in terms of societal and research perspectives. The objective of this book is to provide a forum for researchers and practitioners to exchange ideas and to achieve progress in CPS by highlighting applications, advances and research challenges. It is highly recommended to be used as a reference book for graduate and post-graduate level programmes in universities, with a focus on research in computer science-related courses.

Regular Expressions Cookbook

by Jan Goyvaerts Steven Levithan

<p>Take the guesswork out of using regular expressions. With more than 140 practical recipes, this cookbook provides everything you need to solve a wide range of real-world problems. Novices will learn basic skills and tools, and programmers and experienced users will find a wealth of detail. Each recipe provides samples you can use right away.</p>

Proceedings of International Conference on Communication and Artificial Intelligence: ICCAI 2020 (Lecture Notes in Networks and Systems #192)

by Vishal Goyal Manish Gupta Aditya Trivedi Mohan L. Kolhe

This book is a collection of best selected research papers presented at the International Conference on Communication and Artificial Intelligence (ICCAI 2020), held in the Department of Electronics & Communication Engineering, GLA University, Mathura, India, during 17–18 September 2020. The primary focus of the book is on the research information related to artificial intelligence, networks, and smart systems applied in the areas of industries, government sectors, and educational institutions worldwide. Diverse themes with a central idea of sustainable networking solutions are discussed in the book. The book presents innovative work by leading academics, researchers, and experts from industry.

Proceedings of International Conference on Communication and Artificial Intelligence: ICCAI 2021 (Lecture Notes in Networks and Systems #435)

by Vishal Goyal Manish Gupta Seyedali Mirjalili Aditya Trivedi

This book is a collection of best selected research papers presented at the International Conference on Communication and Artificial Intelligence (ICCAI 2021), held in the Department of Electronics & Communication Engineering, GLA University, Mathura, India, during 19–20 November 2021. The primary focus of the book is on the research information related to artificial intelligence, networks, and smart systems applied in the areas of industries, government sectors, and educational institutions worldwide. Diverse themes with a central idea of sustainable networking solutions are discussed in the book. The book presents innovative work by leading academics, researchers, and experts from industry.

Big Data and Artificial Intelligence: 11th International Conference, BDA 2023, Delhi, India, December 7–9, 2023, Proceedings (Lecture Notes in Computer Science #14418)

by Vikram Goyal Naveen Kumar Sourav S. Bhowmick Pawan Goyal Navneet Goyal Dhruv Kumar

This book constitutes the proceedings of the 11th International Conference on Big Data and Artificial Intelligence, BDA 2023, held in Delhi, India, during December 7–9, 2023. The17 full papers presented in this volume were carefully reviewed and selected from 67 submissions. The papers are organized in the following topical sections: ​Keynote Lectures, Artificial Intelligence in Healthcare, Large Language Models, Data Analytics for Low Resource Domains, Artificial Intelligence for Innovative Applications and Potpourri.

An Integrated Approach to Home Security and Safety Systems

by Sonali Goyal Neera Batra

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB® image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6’s camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person’s heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Advanced Controls for Intelligent Buildings: A Holistic Approach for Successful Businesses

by Siddharth Goyal

This book focuses primarily on both technical and business aspects needed to select, design, develop and deploy control application (or product) successfully for multiple components in building systems. Designing and deploying a control application require multiple steps such as sensing, system dynamics modelling, algorithms, and testing. This may involve choosing an appropriate methodology and technique at multiple stages during the development process. Understanding the pros and cons of such techniques, most importantly being aware of practically possible approaches in the entire ecosystem, is critical in choosing the best framework and system application for different parts of building systems. Providing a wide overview of the state-of art in controls and building systems, providing guidance on developing an end-to-end system in relation to business fundamentals (distribution channels, stakeholders, marketing, supply-chain and financial management), the book is ideal for fourth-year control/mechanical/electrical engineering undergraduates, graduate students, and practitioners including business leaders concerned with smart building technology.

Networks: An Economics Approach

by Sanjeev Goyal

An accessible and comprehensive overview of the economic theory and the realities of networks written by a pioneering economics researcher.Networks are everywhere: the infrastructure that brings water into our homes, the social networks made up of our friends and families, the supply chains connecting cities, people, and goods. These interconnections contain economic trade-offs: for example, should an airline operate direct flights between cities or route all its flights through a hub? Viewing networks through an economics lens, this textbook considers the costs and benefits that govern their formation and functioning. Networks are central to an understanding of the production, consumption, and information that lie at the heart of economic activity. Sanjeev Goyal provides advanced undergraduate and graduate students with an accessible and comprehensive introduction to the economics research on networks of the past twenty-five years. Each chapter introduces a theoretical model illustrated with the help of case studies and formal proofs. After introducing the theoretical concepts, Goyal examines economic networks, including infrastructure, security, market power, and financial networks. He then covers social networks, with chapters on coordinating activity, communication and learning, information networks, epidemics, and impersonal markets. Finally, Goyal locates social and economic networks in a broader context covering networked markets, economic development, trust, and group networks in their relation to markets and the state.First textbook to provide a broad and comprehensive overview of twenty-first-century economic theory of networks Features engaging case studies and accessible exercisesWritten by a pioneering economics researcher

Deep Learning for Natural Language Processing: Creating Neural Networks with Python

by Palash Goyal Sumit Pandey Karan Jain

Discover the concepts of deep learning used for natural language processing (NLP), with full-fledged examples of neural network models such as recurrent neural networks, long short-term memory networks, and sequence-2-sequence models.You’ll start by covering the mathematical prerequisites and the fundamentals of deep learning and NLP with practical examples. The first three chapters of the book cover the basics of NLP, starting with word-vector representation before moving onto advanced algorithms. The final chapters focus entirely on implementation, and deal with sophisticated architectures such as RNN, LSTM, and Seq2seq, using Python tools: TensorFlow, and Keras. Deep Learning for Natural Language Processing follows a progressive approach and combines all the knowledge you have gained to build a question-answer chatbot system.This book is a good starting point for people who want to get started in deep learning for NLP. All the code presented in the book will be available in the form of IPython notebooks and scripts, which allow you to try out the examples and extend them in interesting ways.What You Will LearnGain the fundamentals of deep learning and its mathematical prerequisitesDiscover deep learning frameworks in Python Develop a chatbot Implement a research paper on sentiment classificationWho This Book Is ForSoftware developers who are curious to try out deep learning with NLP.

Interconnection Network Reliability Evaluation: Multistage Layouts (Performability Engineering Series)

by Neeraj Kumar Goyal S. Rajkumar

Keeping in view the growth of the technological frontiers, there is always a need for the development of reliable, fault tolerant and cost- effective interconnection networks (INs) which are the critical metrics to achieve the goal of parallelism. The main objective of this book is to design new fault tolerant interconnection network layouts capable of path redundancy among dynamic failures. New INs designs are proposed and their observed results are found promising when compared with some of the earlier networks. The book also covers the reliability evaluation of various industrial network topologies considering multiple reliability performance parameters (2-TR, broadcast and ATR). Finally, the book also focuses on reliability evaluation and comparison of various topologies considering connectivity among multiple sources and multiple destinations (MSMT) nodes.

Artificial Intelligence and Internet of Things: Applications in Smart Healthcare (Innovations in Big Data and Machine Learning)

by Lalit Mohan Goyal

This book reveals the applications of AI and IoT in smart healthcare and medical systems. It provides core principles, algorithms, protocols, emerging trends, security problems, and the latest e-healthcare services findings.The book also provides case studies and discusses how AI and IoT applications such as wireless devices, sensors, and deep learning could play a major role in assisting patients, doctors, and pharmaceutical staff. It focuses on how to use AI and IoT to keep patients safe and healthy and, at the same time, empower physicians to deliver superlative care.This book is written for researchers and practitioners working in the information technology, computer science, and medical equipment manufacturing industry for products and services having basic- and high-level AI and IoT applications. The book is also a useful guide for academic researchers and students.

Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021 (Algorithms for Intelligent Systems)

by Dinesh Goyal Anil Kumar Vincenzo Piuri Marcin Paprzycki

This book features selected papers presented at Third International Conference on International Conference on Information Management and Machine Intelligence (ICIMMI 2021) held at Poornima Institute of Engineering & Technology, Jaipur, Rajasthan, India during 23 – 24 December 2021. It covers a range of topics, including data analytics; AI; machine and deep learning; information management, security, processing techniques and interpretation; applications of artificial intelligence in soft computing and pattern recognition; cloud-based applications for machine learning; application of IoT in power distribution systems; as well as wireless sensor networks and adaptive wireless communication.

Proceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI 2020 (Lecture Notes in Networks and Systems #166)

by Dinesh Goyal Amit Kumar Gupta Vincenzo Piuri Maria Ganzha Marcin Paprzycki

This book features selected papers presented at Second International Conference on International Conference on Information Management & Machine Intelligence (ICIMMI 2020) held at Poornima Institute of Engineering & Technology, Jaipur, Rajasthan, India during 24 – 25 July 2020. It covers a range of topics, including data analytics; AI; machine and deep learning; information management, security, processing techniques and interpretation; applications of artificial intelligence in soft computing and pattern recognition; cloud-based applications for machine learning; application of IoT in power distribution systems; as well as wireless sensor networks and adaptive wireless communication.

Information Management and Machine Intelligence: Proceedings of ICIMMI 2019 (Algorithms for Intelligent Systems)

by Dinesh Goyal Valentina Emilia Bălaş Abhishek Mukherjee Victor Hugo C. de Albuquerque Amit Kumar Gupta

This book features selected papers presented at the International Conference on Information Management and Machine Intelligence (ICIMMI 2019), held at the Poornima Institute of Engineering & Technology, Jaipur, Rajasthan, India, on December 14–15, 2019. It covers a range of topics, including data analytics; AI; machine and deep learning; information management, security, processing techniques and interpretation; applications of artificial intelligence in soft computing and pattern recognition; cloud-based applications for machine learning; application of IoT in power distribution systems; as well as wireless sensor networks and adaptive wireless communication.

Computation in BioInformatics: Multidisciplinary Applications

by Dinesh Goyal S. Balamurugan Anand Krishnan Boomi Pandi Balakumar Chandrasekaran

COMPUTATION IN BIOINFORMATICS Bioinformatics is a platform between the biology and information technology and this book provides readers with an understanding of the use of bioinformatics tools in new drug design. The discovery of new solutions to pandemics is facilitated through the use of promising bioinformatics techniques and integrated approaches. This book covers a broad spectrum of the bioinformatics field, starting with the basic principles, concepts, and application areas. Also covered is the role of bioinformatics in drug design and discovery, including aspects of molecular modeling. Some of the chapters provide detailed information on bioinformatics related topics, such as silicon design, protein modeling, DNA microarray analysis, DNA-RNA barcoding, and gene sequencing, all of which are currently needed in the industry. Also included are specialized topics, such as bioinformatics in cancer detection, genomics, and proteomics. Moreover, a few chapters explain highly advanced topics, like machine learning and covalent approaches to drug design and discovery, all of which are significant in pharma and biotech research and development. Audience Researchers and engineers in computation biology, information technology, bioinformatics, drug design, biotechnology, pharmaceutical sciences.

API Analytics for Product Managers: Understand key API metrics that can help you grow your business

by Deepa Goyal Kin Lane Vahid Mirjalili Dmytro Dzhulgakov

Research, strategize, market, and continuously measure the effectiveness of APIs to meet your SaaS business goals with this practical handbookKey FeaturesTransform your APIs into revenue-generating entities by turning them into productsMeet your business needs by improving the way you research, strategize, market, and measure resultsCreate and implement a variety of metrics to promote growthBook DescriptionAPIs are crucial in the modern market as they allow faster innovation. But have you ever considered your APIs as products for revenue generation?API Analytics for Product Managers takes you through the benefits of efficient researching, strategizing, marketing, and continuously measuring the effectiveness of your APIs to help grow both B2B and B2C SaaS companies. Once you've been introduced to the concept of an API as a product, this fast-paced guide will show you how to establish metrics for activation, retention, engagement, and usage of your API products, as well as metrics to measure the reach and effectiveness of documentation—an often-overlooked aspect of development.Of course, it's not all about the product—as any good product manager knows; you need to understand your customers' needs, expectations, and satisfaction too. Once you've gathered your data, you'll need to be able to derive actionable insights from it. This is where the book covers the advanced concepts of leading and lagging metrics, removing bias from the metric-setting process, and bringing metrics together to establish long- and short-term goals.By the end of this book, you'll be perfectly placed to apply product management methodologies to the building and scaling of revenue-generating APIs.What you will learnBuild a long-term strategy for an APIExplore the concepts of the API life cycle and API maturityUnderstand APIs from a product management perspectiveCreate support models for your APIs that scale with the productApply user research principles to APIsExplore the metrics of activation, retention, engagement, and churnCluster metrics together to provide contextExamine the consequences of gameable and vanity metricsWho this book is forIf you're a product manager, engineer, or product executive charged with making the most of APIs for your SaaS business, then this book is for you. Basic knowledge of how APIs work and what they do is essential before you get started with this book, since the book covers the analytical side of measuring their performance to help your business grow.

Moving from C to C++: Discussing programming problems, why they exist and how C++ solves them

by Arunesh Goyal

The author says it best, "I hope to move you, a little at a time,from understanding C to the point where C++ becomes your mindset". This remarkable book is designed to streamline the process of learning C++ in a way that discusses programming problems, why they exist, and the approach C++ has taken to solve such problems. "You can't just look at C++ as a collection of features; some of the features make no sense in isolation. You can only use the sum of the parts if you are thinking about design, not simply coding. To understand C++, you must understand the problems with C and with programming in general. This book discusses programming problems, why they are problems, and the approach C++ has taken to solve such problems. Thus, the set of features that I explain in each chapter will be based on the way that I see a particular type of problem being solved in C++." Tailor made to treat difficult concepts in a simple and practical way, the book focuses on building a customizable model for the reader which helps in deducing the solution of any puzzle that one might encounter. The book presents the material one simple step at a time, so the reader can easily digest each concept before moving on. It uses examples that are as simple and as short as possible. This book does not to use any particular vendor’s version of C++ because, for learning the language, the details of a particular implementation are not as important as the language itself. All code in the book was run against the Visual Studio (Microsoft) C++ compiler and Apple's Xcode C++ compiler to ensure accuracy.

Real Estate Crowdfunding: An Insider’s Guide to Investing Online

by Adam Gower

Real Estate Crowdfunding: An Insider’s Guide to Investing Online introduces the reader to basic real estate investment concepts and then takes a deep dive into how to invest passively yet wisely in real estate syndications. This book will teach the reader how to: • invest in crowdfunded real estate syndicates • understand key financial concepts used in the industry • diversify their investment portfolios • read between the lines of investment contracts • maximize profit while minimizing losses This book is a guide to the foundational financial concepts upon which all real estate projects are based and explains the language of real estate from an insider’s perspective. It provides a road map of what to watch for and how to win at the game of passive real estate investing.

You Should Test That

by Chris Goward

Learn how to convert website visitors into customersPart science and part art, conversion optimization is designed to turn visitors into customers. Carefully developed testing procedures are necessary to help you fine-tune images, headlines, navigation, colors, buttons, and every other element, creating a website that encourages visitors to take the action you seek. This book guides you through creating an optimization strategy that supports your business goals, using appropriate analytics tools, generating quality testing ideas, running online experiments, and making the adjustments that work. Conversion optimization is part science and part art; this guide provides step-by-step guidance to help you optimize your website for maximum conversion ratesExplains how to analyze data, prioritize experiment opportunities, and choose the right testing methodsHelps you learn what to adjust, how to do it, and how to analyze the resultsFeatures hands-on exercises, case studies, and a full-color insert reinforcing key tacticsAuthor has used these techniques to assist Fortune 500 clientsYou Should Test That explains both the "why" and the "how" of conversion optimization, helping you maximize the value of your website.

It’s Your Digital Life

by Giri Govindarajulu Shyam Sundar Ramaswami Shriram K. Vasudevan

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

Guide to OCR for Indic Scripts

by Venu Govindaraju Srirangaraj Ranga Setlur

This unique guide/reference is the very first comprehensive book on the subject of OCR (Optical Character Recognition) for Indic scripts. Features: contains contributions from the leading researchers in the field; discusses data set creation for OCR development; describes OCR systems that cover 8 different scripts - Bangla, Devanagari, Gurmukhi, Gujarati, Kannada, Malayalam, Tamil, and Urdu (Perso-Arabic); explores the challenges of Indic script handwriting recognition in the online domain; examines the development of handwriting-based text input systems; describes ongoing work to increase access to Indian cultural heritage materials; provides a section on the enhancement of text and images obtained from historical Indic palm leaf manuscripts; investigates different techniques for word spotting in Indic scripts; reviews mono-lingual and cross-lingual information retrieval in Indic languages. This is an excellent reference for researchers and graduate students studying OCR technology and methodologies.

Algorithms and Discrete Applied Mathematics: Second International Conference, CALDAM 2016, Thiruvananthapuram, India, February 18-20, 2016, Proceedings (Lecture Notes in Computer Science #9602)

by Sathish Govindarajan Anil Maheshwari

This book collects the refereed proceedingsof the Second International Conference on Algorithms and Discrete AppliedMathematics, CALDAM 2016, held in Thiruvananthapuram, India, in February 2016. The volume contains 30 full revised papers from 90 submissions along with 1invited talk presented at the conference. The conference focuses on topicsrelated to efficient algorithms and data structures, their analysis (boththeoretical and experimental) and the mathematical problems arising thereof,and new applications of discrete mathematics, advances in existing applicationsand development of new tools for discrete mathematics.

Cloud Native Networking Deep-Dive (River Publishers Rapids Series in Communications and Networking)

by Chander Govindarajan Priyanka Naik

This book demystifies how Kubernetes networking actually works by walking through a simple but practical simulation that mirrors reality as closely as possible, while skipping the gory details. Widespread adoption of container orchestration platforms like Kubernetes have spawned a whole field of industry products, startups and academic research in the field of container networking, typically termed as cloud-native networking. But, what is cloud-native networking? What are the various pieces and how do they fit together? Over recent years, most applications have been deployed on cloud infrastructure. Kubernetes has been the widely adopted orchestrator for these clouds. Application developers in most cases are unaware of the underlying plumbing in Kubernetes that holds their applications running as containers. Networking is an integral part of any Kubernetes environment and efficiently drives the various abstractions provided by it. Needless to say, it greatly effects the performance of applications, which in general have a humongous amount of inter-microservice communication. The impact is even more profound in multiple cloud environments.

Test-Driven Python Development

by Siddharta Govindaraj

This book is intended for Python developers who want to use the principles of test-driven development (TDD) to create efficient and robust applications. In order to get the best out of this book, you should have development experience with Python.

Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques

by Francis X. Govers

Bring a new degree of interconnectivity to your world by building your own intelligent robots Key Features Leverage fundamentals of AI and robotics Work through use cases to implement various machine learning algorithms Explore Natural Language Processing (NLP) concepts for efficient decision making in robots Book Description Artificial Intelligence for Robotics starts with an introduction to Robot Operating Systems (ROS), Python, robotic fundamentals, and the software and tools that are required to start out with robotics. You will learn robotics concepts that will be useful for making decisions, along with basic navigation skills. As you make your way through the chapters, you will learn about object recognition and genetic algorithms, which will teach your robot to identify and pick up an irregular object. With plenty of use cases throughout, you will explore natural language processing (NLP) and machine learning techniques to further enhance your robot. In the concluding chapters, you will learn about path planning and goal-oriented programming, which will help your robot prioritize tasks. By the end of this book, you will have learned to give your robot an artificial personality using simulated intelligence. What you will learn Get started with robotics and artificial intelligence Apply simulation techniques to give your robot an artificial personality Understand object recognition using neural networks and supervised learning techniques Pick up objects using genetic algorithms for manipulation Teach your robot to listen using NLP via an expert system Use machine learning and computer vision to teach your robot how to avoid obstacles Understand path planning, decision trees, and search algorithms in order to enhance your robot Who this book is for If you have basic knowledge about robotics and want to build or enhance your existing robot's intelligence, then Artificial Intelligence for Robotics is for you. This book is also for enthusiasts who want to gain knowledge of AI and robotics.

Rules and Reasoning: 6th International Joint Conference on Rules and Reasoning, RuleML+RR 2022, Berlin, Germany, September 26–28, 2022, Proceedings (Lecture Notes in Computer Science #13752)

by Guido Governatori Anni-Yasmin Turhan

This book constitutes the proceedings of the International Joint Conference on Rules and Reasoning, RuleML+RR 2022, held in Berlin, Germany, during September 26–28, 2022. This is the 6th conference of a new series, joining the efforts of two existing conference series, namely “RuleML” (International Web Rule Symposium) and “RR” (Web Reasoning and Rule Systems). The 18 full research papers presented in this book were carefully reviewed and selected from 54 submissions. The papers cover the following topics: answer set programming; foundations of nonmonotonic reasoning; datalog; queries over ontologies; proofs, error-tolerance, and rules; as well as agents and argumentation.

Co-Clustering: Models, Algorithms and Applications (Focus Ser.)

by Gérard Govaert Mohamed Nadif

Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gérard Govaert is Professor at the University of Technology of Compiègne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabi

Getting Started with C++ Audio Programming for Game Development

by David Gouveia

This book is a standard tutorial targeted at game developers which aims to help them incorporate audio programming techniques to enhance their gameplay experience.This book is perfect for C++ game developers who have no experience with audio programming and who would like a quick introduction to the most important topics required to integrate audio into a game.

Cryptofinance and Mechanisms of Exchange: The Making of Virtual Currency (Contributions to Management Science)

by Stéphane Goutte Khaled Guesmi Samir Saadi

This book describes how the rapid advancement in encryption and network computing gave birth to new tools and products that have influenced the local and global economy alike. One recent and notable example is the emergence of virtual currencies (such as Bitcoin) also known as cryptocurrencies. Virtual currencies introduced a fundamental transformation that affected the way goods, services and assets are exchanged. As a result of its distributed ledgers based on blockchain, cryptocurrencies not only offer some unique advantages to the economy, investors, and consumers, but also pose considerable risks to users and challenges for regulators when fitting the new technology into the old legal framework. The core of this proposed book is to present and discuss the evidence on financial asset capabilities of virtual currencies. The contributors of this volume analyze several interesting and timely issues such as the particularities of virtual currencies and their statistical characteristics; the diversification benefits of virtual currencies; the behavior and dependence structure between virtual currencies and the financial markets; the economic implications of virtual currencies, their effects, their price risk, and contagion spillovers in a unified and comprehensive framework; the future of virtual currencies and their distributed ledgers technology.

Refine Search

Showing 36,401 through 36,500 of 53,642 results