Browse Results

Showing 1 through 25 of 27,685 results

كتاب العشق الإلكتروني

by عبدالله علي الأسمري

كم كانت رائعة تلك اللحظة التي قررت فيها قبل عقد من الزمن أن أدلف إلى مقهى للإنترنت في قلب مدينة الرياض لأول مرة في حياتي. رأيت عامل المقهى وقد ارتسمت على وجهه ابتسامة عريضة وهو يقودني إلى مربع صغير يحوي طاولة انتصب عليها جهاز حاسوبي ذي شاشة عريضة. بدا المكان معزولا من ثلاث جهات أما الجهة الرابعة والتي يتم من خلالها الدخول فكانت عبارة عن باب صغير ينغلق بمجرد الدخول. بعد أن استويت على المقعد هرع العامل إلى أيقونة المتصفح browser ليطمس منه سجل المستخدم السابق وذلك - على ما يبدو - لكي لا أ لقي نظرة على ما كان يفعله من جاء قبلي. لم تسعفني خبرتي إذ ذاك في تفسر مغزى ذلك التصرف

掌握比特币-开始赚取比特币的指导: New Moon (Vampyre Ser.)

by Adidas Wilson 顺宏

比特币是由名不副实的程序员或者一群程序员发明的一种加密货币和数字支付系统,名叫Satoshi Nakamoto。 它在2009年作为开源软件发布。 系统是点对点的,交易是直接在用户之间进行的,没有中间人。 这些交易由网络节点验证,并记录在称为区块链的公共分布式账本中。 由于该系统没有中央存储库或单个管理员,比特币被称为第一个分散数字货币。 比特币除了被创造为挖矿的奖励外,还可以在合法或黑市交换其他货币,产品和服务。 截至2015年2月,超过10万商户和供应商接受比特币作为付款。 根据剑桥大学2017年的研究报告,使用加密货币钱包的用户数量达到2.9-580万,其中大部分使用比特币。

CWNA Certified Wireless Network Administrator Official Study Guide

by David A. Coleman David D. Westcott

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802. 11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP's website at www. cwnp. com/sybex.

Packet Tracer Network Simulator

by Jesin A

A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer. Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

Photoshop CS2 RAW

by Mikkel Aaland

The RAW file format is the uncompressed data file captured by a digital camera's electronic sensor. When your camera saves an image in RAW format, settings like white balance, sharpening, contrast and saturation are not applied to the image but are saved instead in a separate header. Because RAW files remain virtually untouched by in-camera processing, they are essentially the digital equivalent to exposed but undeveloped film. This makes RAW an increasingly popular format with amateur and professional digital photographers, because it affords greater flexibility and control during the editing process-if you know how to work with RAW files. Most digital camera manufacturers supply their own software for converting RAW data, as do some third party vendors. Increasingly, however, the RAW converter of choice is a plug-in included in the latest version of Adobe Photoshop, the most popular and widely-used digital image editing tool in the world. Adobe Photoshop CS2 is emerging as the best place to edit RAW images, and the best way to master this new format is with Photoshop CS2 RAW. An important book dedicated to working with RAW in Photoshop, this comprehensive guide features a unique design that helps readers grasp the subject through visual instruction and prompts. The entire RAW process is explored, from shooting to using the Adobe plug-in converter and new Bridge navigation software. The primary focus of Photoshop RAW is, as the title suggests, Photoshop editing technique: automating RAW workflow, correcting exposures, extending exposure range, manipulating grayscale and working with the new DNG (Digital Negative) open standard that Adobe supports. Presented by photographer Mikkel Aaland, a pioneer of digital photography and author of eight books, including O'Reilly's Photoshop for the Web and the award-winning Shooting Digital, Photoshop CS2 RAW investigates and instructs in an accessible visual style. Required reading for professionals and dedicated photo hobbyists alike.

Microsoft Dynamics AX 2012 Financial Management

by Mohamed Aamer

This book is a practical, hands-on guide that covers both the basic and advanced concepts of financial management using Microsoft Dynamics AX.Microsoft Dynamics AX Financial Management is for Microsoft Dynamics AX solution architects, application consultants, support engineers, pre-technical sales consultants, and project managers on the partner side, as well as chief financial officers, financial controllers, accounting managers, key users, business analysts, and chief information officers on the customer side. A basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies will help you better understand the concepts covered in this book.

Microsoft Dynamics AX 2012 R3 Financial Management

by Mohamed Aamer

This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

Quantum Computing since Democritus

by Scott Aaronson

Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Predicting the Future

by Henry Abarbanel

Through the development of an exact path integral for use in transferring information from observations to a model of the observed system, the author provides a general framework for the discussion of model building and evaluation across disciplines. Through many illustrative examples drawn from models in neuroscience, geosciences, and nonlinear electrical circuits, the concepts are exemplified in detail. Practical numerical methods for approximate evaluations of the path integral are explored, and their use in designing experiments and determining a model's consistency with observations is explored.

Applications and Usability of Interactive TV: 7th Iberoamerican Conference, jAUTI 2018, Bernal, Argentina, October 16–18, 2018, Revised Selected Papers (Communications in Computer and Information Science #1004)

by María José Abásolo Telmo Silva Nestor D. González

This book constitutes the refereed proceedings of the 7th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2018, in Bernal, Argentina, in October 2018.The 13 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Contexts of application of the IDTV; Design and Implementation Techniques of IDTV Content and Services; Interaction Techniques, Technologies and Accesibility of IDTV Services; Testing and User Experience of IDTV Services.

Hybrid Systems Biology

by Alessandro Abate David Šafránek

This book constitutes the thoroughly referred post-workshop proceedings of the 4th International Workshop on Hybrid Systems biology, HSB 2015, held as part of the Madrid Meet 2015 event, in Madrid, Spain in September 2015. The volume presents 13 full papers together with 2 abstracts of invited sessions from 18 submissions. The scope of the HSB workshop is the general area of dynamical models in Biology with an emphasis on hybrid approaches -- by no means restricted to a narrow class of mathematical models -- and taking advantage of techniques developed separately in different areas.

Curves and Surfaces (UNITEXT)

by M. Abate F. Tovena

The book provides an introduction to Differential Geometry of Curves and Surfaces. The theory of curves starts with a discussion of possible definitions of the concept of curve, proving in particular the classification of 1-dimensional manifolds. We then present the classical local theory of parametrized plane and space curves (curves in n-dimensional space are discussed in the complementary material): curvature, torsion, Frenet's formulas and the fundamental theorem of the local theory of curves. Then, after a self-contained presentation of degree theory for continuous self-maps of the circumference, we study the global theory of plane curves, introducing winding and rotation numbers, and proving the Jordan curve theorem for curves of class C2, and Hopf theorem on the rotation number of closed simple curves. The local theory of surfaces begins with a comparison of the concept of parametrized (i.e., immersed) surface with the concept of regular (i.e., embedded) surface. We then develop the basic differential geometry of surfaces in R3: definitions, examples, differentiable maps and functions, tangent vectors (presented both as vectors tangent to curves in the surface and as derivations on germs of differentiable functions; we shall consistently use both approaches in the whole book) and orientation. Next we study the several notions of curvature on a surface, stressing both the geometrical meaning of the objects introduced and the algebraic/analytical methods needed to study them via the Gauss map, up to the proof of Gauss' Teorema Egregium. Then we introduce vector fields on a surface (flow, first integrals, integral curves) and geodesics (definition, basic properties, geodesic curvature, and, in the complementary material, a full proof of minimizing properties of geodesics and of the Hopf-Rinow theorem for surfaces). Then we shall present a proof of the celebrated Gauss-Bonnet theorem, both in its local and in its global form, using basic properties (fully proved in the complementary material) of triangulations of surfaces. As an application, we shall prove the Poincaré-Hopf theorem on zeroes of vector fields. Finally, the last chapter will be devoted to several important results on the global theory of surfaces, like for instance the characterization of surfaces with constant Gaussian curvature, and the orientability of compact surfaces in R3.

Recent Advances on Soft Computing and Data Mining

by Jemal H. Abawajy Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book offers a systematic overview of the concepts and practical techniques that readers need to get the most out of their large-scale data mining projects and research studies. It guides them through the data-analytical thinking essential to extract useful information and obtain commercial value from the data. Presenting the outcomes of International Conference on Soft Computing and Data Mining (SCDM-2017), held in Johor, Malaysia on February 6-8, 2018, it provides a well-balanced integration of soft computing and data mining techniques. The two constituents are brought together in various combinations of applications and practices. To thrive in these data-driven ecosystems, researchers, engineers, data analysts, practitioners, and managers must understand the design choice and options of soft computing and data mining techniques, and as such this book is a valuable resource, helping readers solve complex benchmark problems and better appreciate the concepts, tools, and techniques employed.

Security in Computing and Communications

by Jemal H. Abawajy Sougata Mukherjea Sabu M. Thampi Antonio Ruiz-Martínez

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #839)

by Jemal Abawajy Shekhar Verma Ranjeet Singh Tomar Brijesh Kumar Chaurasia Vrijendra Singh

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Windows 10: Learn Tips And Tricks On Using Windows 10 Operating System

by Blerton Abazi

Windows 10 Learn tips and trick on using Windows 10 operating system

Learning Apache Spark 2

by Muhammad Asif Abbasi

Learn about the fastest-growing open source project in the world, and find out how it revolutionizes big data analytics About This Book • Exclusive guide that covers how to get up and running with fast data processing using Apache Spark • Explore and exploit various possibilities with Apache Spark using real-world use cases in this book • Want to perform efficient data processing at real time? This book will be your one-stop solution. Who This Book Is For This guide appeals to big data engineers, analysts, architects, software engineers, even technical managers who need to perform efficient data processing on Hadoop at real time. Basic familiarity with Java or Scala will be helpful. The assumption is that readers will be from a mixed background, but would be typically people with background in engineering/data science with no prior Spark experience and want to understand how Spark can help them on their analytics journey. What You Will Learn • Get an overview of big data analytics and its importance for organizations and data professionals • Delve into Spark to see how it is different from existing processing platforms • Understand the intricacies of various file formats, and how to process them with Apache Spark. • Realize how to deploy Spark with YARN, MESOS or a Stand-alone cluster manager. • Learn the concepts of Spark SQL, SchemaRDD, Caching and working with Hive and Parquet file formats • Understand the architecture of Spark MLLib while discussing some of the off-the-shelf algorithms that come with Spark. • Introduce yourself to the deployment and usage of SparkR. • Walk through the importance of Graph computation and the graph processing systems available in the market • Check the real world example of Spark by building a recommendation engine with Spark using ALS. • Use a Telco data set, to predict customer churn using Random Forests. In Detail Spark juggernaut keeps on rolling and getting more and more momentum each day. Spark provides key capabilities in the form of Spark SQL, Spark Streaming, Spark ML and Graph X all accessible via Java, Scala, Python and R. Deploying the key capabilities is crucial whether it is on a Standalone framework or as a part of existing Hadoop installation and configuring with Yarn and Mesos. The next part of the journey after installation is using key components, APIs, Clustering, machine learning APIs, data pipelines, parallel programming. It is important to understand why each framework component is key, how widely it is being used, its stability and pertinent use cases. Once we understand the individual components, we will take a couple of real life advanced analytics examples such as 'Building a Recommendation system', 'Predicting customer churn' and so on. The objective of these real life examples is to give the reader confidence of using Spark for real-world problems. Style and approach With the help of practical examples and real-world use cases, this guide will take you from scratch to building efficient data applications using Apache Spark. You will learn all about this excellent data processing engine in a step-by-step manner, taking one aspect of it at a time. This highly practical guide will include how to work with data pipelines, dataframes, clustering, SparkSQL, parallel programming, and such insightful topics with the help of real-world use cases.

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Recent Advances in Computational Intelligence in Defense and Security

by Hussein A. Abbass Rami Abielmona Rafael Falcon Nur Zincir-Heywood

This volume is an initiative undertaken by the IEEE ComputationalIntelligence Society's Task Force on Security, Surveillance and Defense to consolidateand disseminate the role of CI techniques in the design, development anddeployment of security and defense solutions. Applications range from thedetection of buried explosive hazards in a battlefield to the control ofunmanned underwater vehicles, the delivery of superior video analytics forprotecting critical infrastructures or the development of stronger intrusiondetection systems and the design of military surveillance networks. Defensescientists, industry experts, academicians and practitioners alike will allbenefit from the wide spectrum of successful applications compiled in thisvolume. Senior undergraduate or graduate students may also discover unchartedterritory for their own research endeavors.

Evolutionary Computation and Complex Networks

by Hussein A. Abbass Jing Liu Kay Chen Tan

This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms. The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks.

Inventing the Internet

by Janet Abbate

Since the late 1960s the Internet has grown from a single experimental network serving a dozen sites in the United States to a network of networks linking millions of computers worldwide. In Inventing the Internet, Janet Abbate recounts the key players and technologies that allowed the Internet to develop; but her main focus is always on the social and cultural factors that influenced the Internets design and use. The story she unfolds is an often twisting tale of collaboration and conflict among a remarkable variety of players, including government and military agencies, computer scientists in academia and industry, graduate students, telecommunications companies, standards organizations, and network users. The story starts with the early networking breakthroughs formulated in Cold War think tanks and realized in the Defense Department's creation of the ARPANET. It ends with the emergence of the Internet and its rapid and seemingly chaotic growth. Abbate looks at how academic and military influences and attitudes shaped both networks; how the usual lines between producer and user of a technology were crossed with interesting and unique results; and how later users invented their own very successful applications, such as electronic mail and the World Wide Web. She concludes that such applications continue the trend of decentralized, user-driven development that has characterized the Internet's entire history and that the key to the Internet's success has been a commitment to flexibility and diversity, both in technical design and in organizational culture.

Recoding Gender

by Janet Abbate

Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male "computer geek" seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field. Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine "software engineering." She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science. Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Text und Konzeption im Content Marketing: Alle wichtigen Grundlagen für Print, Web, Corporate Blogs und Social Media (essentials)

by Sandro Abbate

In diesem essential erfahren Sie alle wichtigen Grundlagen der Text- und Konzeptentwicklung f#65533;r eine Content-Marketing-Strategie. Der Autor beschreibt die erfolgsentscheidenden Stellschrauben, die Sie beachten m#65533;ssen und in die Sie ausreichend Zeit investieren sollten: von der vorab zu leistenden Denkarbeit, #65533;ber die strukturierte Konzeptentwicklung, bis hin zur optimalen Textarbeit f#65533;r Webtexte. Abgerundet wird dieser Band durch Interviews mit renommierten Experten und Erfolgsbeispielen aus der Praxis.

Applied Predictive Analytics

by Dean Abbott

Learn the art and science of predictive analytics -- techniques that get resultsPredictive analytics is what translates big data into meaningful, usable business information. Written by a leading expert in the field, this guide examines the science of the underlying algorithms as well as the principles and best practices that govern the art of predictive analytics. It clearly explains the theory behind predictive analytics, teaches the methods, principles, and techniques for conducting predictive analytics projects, and offers tips and tricks that are essential for successful predictive modeling. Hands-on examples and case studies are included.The ability to successfully apply predictive analytics enables businesses to effectively interpret big data; essential for competition todayThis guide teaches not only the principles of predictive analytics, but also how to apply them to achieve real, pragmatic solutionsExplains methods, principles, and techniques for conducting predictive analytics projects from start to finishIllustrates each technique with hands-on examples and includes as series of in-depth case studies that apply predictive analytics to common business scenariosA companion website provides all the data sets used to generate the examples as well as a free trial version of softwareApplied Predictive Analytics arms data and business analysts and business managers with the tools they need to interpret and capitalize on big data.

Refine Search

Showing 1 through 25 of 27,685 results