Browse Results

Showing 1 through 25 of 28,649 results

كتاب العشق الإلكتروني

by عبدالله علي الأسمري

كم كانت رائعة تلك اللحظة التي قررت فيها قبل عقد من الزمن أن أدلف إلى مقهى للإنترنت في قلب مدينة الرياض لأول مرة في حياتي. رأيت عامل المقهى وقد ارتسمت على وجهه ابتسامة عريضة وهو يقودني إلى مربع صغير يحوي طاولة انتصب عليها جهاز حاسوبي ذي شاشة عريضة. بدا المكان معزولا من ثلاث جهات أما الجهة الرابعة والتي يتم من خلالها الدخول فكانت عبارة عن باب صغير ينغلق بمجرد الدخول. بعد أن استويت على المقعد هرع العامل إلى أيقونة المتصفح browser ليطمس منه سجل المستخدم السابق وذلك - على ما يبدو - لكي لا أ لقي نظرة على ما كان يفعله من جاء قبلي. لم تسعفني خبرتي إذ ذاك في تفسر مغزى ذلك التصرف

掌握比特币-开始赚取比特币的指导: New Moon (Vampyre Ser.)

by Adidas Wilson 顺宏

比特币是由名不副实的程序员或者一群程序员发明的一种加密货币和数字支付系统,名叫Satoshi Nakamoto。 它在2009年作为开源软件发布。 系统是点对点的,交易是直接在用户之间进行的,没有中间人。 这些交易由网络节点验证,并记录在称为区块链的公共分布式账本中。 由于该系统没有中央存储库或单个管理员,比特币被称为第一个分散数字货币。 比特币除了被创造为挖矿的奖励外,还可以在合法或黑市交换其他货币,产品和服务。 截至2015年2月,超过10万商户和供应商接受比特币作为付款。 根据剑桥大学2017年的研究报告,使用加密货币钱包的用户数量达到2.9-580万,其中大部分使用比特币。

CWNA Certified Wireless Network Administrator Official Study Guide

by David A. Coleman David D. Westcott

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802. 11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP's website at www. cwnp. com/sybex.

Packet Tracer Network Simulator

by Jesin A

A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer. Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

Photoshop CS2 RAW

by Mikkel Aaland

The RAW file format is the uncompressed data file captured by a digital camera's electronic sensor. When your camera saves an image in RAW format, settings like white balance, sharpening, contrast and saturation are not applied to the image but are saved instead in a separate header. Because RAW files remain virtually untouched by in-camera processing, they are essentially the digital equivalent to exposed but undeveloped film. This makes RAW an increasingly popular format with amateur and professional digital photographers, because it affords greater flexibility and control during the editing process-if you know how to work with RAW files. Most digital camera manufacturers supply their own software for converting RAW data, as do some third party vendors. Increasingly, however, the RAW converter of choice is a plug-in included in the latest version of Adobe Photoshop, the most popular and widely-used digital image editing tool in the world. Adobe Photoshop CS2 is emerging as the best place to edit RAW images, and the best way to master this new format is with Photoshop CS2 RAW. An important book dedicated to working with RAW in Photoshop, this comprehensive guide features a unique design that helps readers grasp the subject through visual instruction and prompts. The entire RAW process is explored, from shooting to using the Adobe plug-in converter and new Bridge navigation software. The primary focus of Photoshop RAW is, as the title suggests, Photoshop editing technique: automating RAW workflow, correcting exposures, extending exposure range, manipulating grayscale and working with the new DNG (Digital Negative) open standard that Adobe supports. Presented by photographer Mikkel Aaland, a pioneer of digital photography and author of eight books, including O'Reilly's Photoshop for the Web and the award-winning Shooting Digital, Photoshop CS2 RAW investigates and instructs in an accessible visual style. Required reading for professionals and dedicated photo hobbyists alike.

Microsoft Dynamics AX 2012 Financial Management

by Mohamed Aamer

This book is a practical, hands-on guide that covers both the basic and advanced concepts of financial management using Microsoft Dynamics AX.Microsoft Dynamics AX Financial Management is for Microsoft Dynamics AX solution architects, application consultants, support engineers, pre-technical sales consultants, and project managers on the partner side, as well as chief financial officers, financial controllers, accounting managers, key users, business analysts, and chief information officers on the customer side. A basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies will help you better understand the concepts covered in this book.

Microsoft Dynamics AX 2012 R3 Financial Management

by Mohamed Aamer

This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

Quantum Computing since Democritus

by Scott Aaronson

Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists

by Frank Abagnale

Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks.Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: * The best way to protect your phone from being hacked * The only time you should ever use a debit card * The one type of photo you should never post on social media * The only conditions under which you should use WiFi networks at the airport * The safest way to use an ATM With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet.

Predicting the Future

by Henry Abarbanel

Through the development of an exact path integral for use in transferring information from observations to a model of the observed system, the author provides a general framework for the discussion of model building and evaluation across disciplines. Through many illustrative examples drawn from models in neuroscience, geosciences, and nonlinear electrical circuits, the concepts are exemplified in detail. Practical numerical methods for approximate evaluations of the path integral are explored, and their use in designing experiments and determining a model's consistency with observations is explored.

Applications and Usability of Interactive TV: 5th Iberoamerican Conference, jAUTI 2016, La Habana, Cuba, November 21-25, 2016, Revised Selected Papers (Communications in Computer and Information Science #689)

by María José Abásolo Pedro Almeida Joaquín Pina Amargós

This book constitutes the refereed proceedings of the 5th Iberoamerican Conference on Applications and Usability of Interactive TV , jAUTI 2016, held in conjunction with the III International Congress on Information Engineering and Information Systems, in La Habana, Cuba, in November 2016. The 11 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on IDTV content production and recommendation; video consumption and preservation; social TV; IDTV interaction techniques; IDTV user experiences.

Applications and Usability of Interactive TV: 7th Iberoamerican Conference, jAUTI 2018, Bernal, Argentina, October 16–18, 2018, Revised Selected Papers (Communications in Computer and Information Science #1004)

by María José Abásolo Telmo Silva Nestor D. González

This book constitutes the refereed proceedings of the 7th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2018, in Bernal, Argentina, in October 2018.The 13 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Contexts of application of the IDTV; Design and Implementation Techniques of IDTV Content and Services; Interaction Techniques, Technologies and Accesibility of IDTV Services; Testing and User Experience of IDTV Services.

Hybrid Systems Biology

by Alessandro Abate David Šafránek

This book constitutes the thoroughly referred post-workshop proceedings of the 4th International Workshop on Hybrid Systems biology, HSB 2015, held as part of the Madrid Meet 2015 event, in Madrid, Spain in September 2015. The volume presents 13 full papers together with 2 abstracts of invited sessions from 18 submissions. The scope of the HSB workshop is the general area of dynamical models in Biology with an emphasis on hybrid approaches -- by no means restricted to a narrow class of mathematical models -- and taking advantage of techniques developed separately in different areas.

Curves and Surfaces (UNITEXT)

by M. Abate F. Tovena

The book provides an introduction to Differential Geometry of Curves and Surfaces. The theory of curves starts with a discussion of possible definitions of the concept of curve, proving in particular the classification of 1-dimensional manifolds. We then present the classical local theory of parametrized plane and space curves (curves in n-dimensional space are discussed in the complementary material): curvature, torsion, Frenet's formulas and the fundamental theorem of the local theory of curves. Then, after a self-contained presentation of degree theory for continuous self-maps of the circumference, we study the global theory of plane curves, introducing winding and rotation numbers, and proving the Jordan curve theorem for curves of class C2, and Hopf theorem on the rotation number of closed simple curves. The local theory of surfaces begins with a comparison of the concept of parametrized (i.e., immersed) surface with the concept of regular (i.e., embedded) surface. We then develop the basic differential geometry of surfaces in R3: definitions, examples, differentiable maps and functions, tangent vectors (presented both as vectors tangent to curves in the surface and as derivations on germs of differentiable functions; we shall consistently use both approaches in the whole book) and orientation. Next we study the several notions of curvature on a surface, stressing both the geometrical meaning of the objects introduced and the algebraic/analytical methods needed to study them via the Gauss map, up to the proof of Gauss' Teorema Egregium. Then we introduce vector fields on a surface (flow, first integrals, integral curves) and geodesics (definition, basic properties, geodesic curvature, and, in the complementary material, a full proof of minimizing properties of geodesics and of the Hopf-Rinow theorem for surfaces). Then we shall present a proof of the celebrated Gauss-Bonnet theorem, both in its local and in its global form, using basic properties (fully proved in the complementary material) of triangulations of surfaces. As an application, we shall prove the Poincaré-Hopf theorem on zeroes of vector fields. Finally, the last chapter will be devoted to several important results on the global theory of surfaces, like for instance the characterization of surfaces with constant Gaussian curvature, and the orientability of compact surfaces in R3.

Recent Advances on Soft Computing and Data Mining

by Jemal H. Abawajy Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book offers a systematic overview of the concepts and practical techniques that readers need to get the most out of their large-scale data mining projects and research studies. It guides them through the data-analytical thinking essential to extract useful information and obtain commercial value from the data. Presenting the outcomes of International Conference on Soft Computing and Data Mining (SCDM-2017), held in Johor, Malaysia on February 6-8, 2018, it provides a well-balanced integration of soft computing and data mining techniques. The two constituents are brought together in various combinations of applications and practices. To thrive in these data-driven ecosystems, researchers, engineers, data analysts, practitioners, and managers must understand the design choice and options of soft computing and data mining techniques, and as such this book is a valuable resource, helping readers solve complex benchmark problems and better appreciate the concepts, tools, and techniques employed.

Advances on Computational Intelligence in Energy: The Applications of Nature-Inspired Metaheuristic Algorithms in Energy (Green Energy and Technology)

by Jemal H. Abawajy Tutut Herawan Haruna Chiroma

Addressing the applications of computational intelligence algorithms in energy, this book presents a systematic procedure that illustrates the practical steps required for applying bio-inspired, meta-heuristic algorithms in energy, such as the prediction of oil consumption and other energy products. Contributions include research findings, projects, surveying work and industrial experiences that describe significant advances in the applications of computational intelligence algorithms in energy. For easy understanding, the text provides practical simulation results, convergence and learning curves as well as illustrations and tables. Providing a valuable resource for undergraduate and postgraduate students alike, it is also intended for researchers in the fields of computational intelligence and energy.

Proceedings of the International Conference on Data Engineering 2015 (Lecture Notes in Electrical Engineering #520)

by Jemal H. Abawajy Tutut Herawan Rozaida Ghazali Mustafa Mat Deris Mohamed Othman Hairulnizam Mahdin

These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: • Data engineering • Big data • Data and knowledge visualization • Data management • Data mining and warehousing • Data privacy & security • Database theory • Heterogeneous databases • Knowledge discovery in databases • Mobile, grid and cloud computing • Knowledge management • Parallel and distributed data • Temporal data • Web data, services and information engineering • Decision support systems • E-Business engineering and management • E-commerce and e-learning • Geographical information systems • Information management • Information quality and strategy • Information retrieval, integration and visualization • Information security • Information systems and technologies

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence (Advances in Intelligent Systems and Computing #1017)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Mohammed Atiquzzaman Zheng Xu

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Security in Computing and Communications

by Jemal H. Abawajy Sougata Mukherjea Sabu M. Thampi Antonio Ruiz-Martínez

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #839)

by Jemal Abawajy Shekhar Verma Ranjeet Singh Tomar Brijesh Kumar Chaurasia Vrijendra Singh

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Windows 10: Learn Tips And Tricks On Using Windows 10 Operating System

by Blerton Abazi

Windows 10 Learn tips and trick on using Windows 10 operating system

Learning Apache Spark 2

by Muhammad Asif Abbasi

Learn about the fastest-growing open source project in the world, and find out how it revolutionizes big data analytics About This Book • Exclusive guide that covers how to get up and running with fast data processing using Apache Spark • Explore and exploit various possibilities with Apache Spark using real-world use cases in this book • Want to perform efficient data processing at real time? This book will be your one-stop solution. Who This Book Is For This guide appeals to big data engineers, analysts, architects, software engineers, even technical managers who need to perform efficient data processing on Hadoop at real time. Basic familiarity with Java or Scala will be helpful. The assumption is that readers will be from a mixed background, but would be typically people with background in engineering/data science with no prior Spark experience and want to understand how Spark can help them on their analytics journey. What You Will Learn • Get an overview of big data analytics and its importance for organizations and data professionals • Delve into Spark to see how it is different from existing processing platforms • Understand the intricacies of various file formats, and how to process them with Apache Spark. • Realize how to deploy Spark with YARN, MESOS or a Stand-alone cluster manager. • Learn the concepts of Spark SQL, SchemaRDD, Caching and working with Hive and Parquet file formats • Understand the architecture of Spark MLLib while discussing some of the off-the-shelf algorithms that come with Spark. • Introduce yourself to the deployment and usage of SparkR. • Walk through the importance of Graph computation and the graph processing systems available in the market • Check the real world example of Spark by building a recommendation engine with Spark using ALS. • Use a Telco data set, to predict customer churn using Random Forests. In Detail Spark juggernaut keeps on rolling and getting more and more momentum each day. Spark provides key capabilities in the form of Spark SQL, Spark Streaming, Spark ML and Graph X all accessible via Java, Scala, Python and R. Deploying the key capabilities is crucial whether it is on a Standalone framework or as a part of existing Hadoop installation and configuring with Yarn and Mesos. The next part of the journey after installation is using key components, APIs, Clustering, machine learning APIs, data pipelines, parallel programming. It is important to understand why each framework component is key, how widely it is being used, its stability and pertinent use cases. Once we understand the individual components, we will take a couple of real life advanced analytics examples such as 'Building a Recommendation system', 'Predicting customer churn' and so on. The objective of these real life examples is to give the reader confidence of using Spark for real-world problems. Style and approach With the help of practical examples and real-world use cases, this guide will take you from scratch to building efficient data applications using Apache Spark. You will learn all about this excellent data processing engine in a step-by-step manner, taking one aspect of it at a time. This highly practical guide will include how to work with data pipelines, dataframes, clustering, SparkSQL, parallel programming, and such insightful topics with the help of real-world use cases.

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Recent Advances in Computational Intelligence in Defense and Security

by Hussein A. Abbass Rami Abielmona Rafael Falcon Nur Zincir-Heywood

This volume is an initiative undertaken by the IEEE ComputationalIntelligence Society's Task Force on Security, Surveillance and Defense to consolidateand disseminate the role of CI techniques in the design, development anddeployment of security and defense solutions. Applications range from thedetection of buried explosive hazards in a battlefield to the control ofunmanned underwater vehicles, the delivery of superior video analytics forprotecting critical infrastructures or the development of stronger intrusiondetection systems and the design of military surveillance networks. Defensescientists, industry experts, academicians and practitioners alike will allbenefit from the wide spectrum of successful applications compiled in thisvolume. Senior undergraduate or graduate students may also discover unchartedterritory for their own research endeavors.

Refine Search

Showing 1 through 25 of 28,649 results