Browse Results

Showing 1 through 25 of 34,193 results

كتاب العشق الإلكتروني

by عبدالله علي الأسمري

كم كانت رائعة تلك اللحظة التي قررت فيها قبل عقد من الزمن أن أدلف إلى مقهى للإنترنت في قلب مدينة الرياض لأول مرة في حياتي. رأيت عامل المقهى وقد ارتسمت على وجهه ابتسامة عريضة وهو يقودني إلى مربع صغير يحوي طاولة انتصب عليها جهاز حاسوبي ذي شاشة عريضة. بدا المكان معزولا من ثلاث جهات أما الجهة الرابعة والتي يتم من خلالها الدخول فكانت عبارة عن باب صغير ينغلق بمجرد الدخول. بعد أن استويت على المقعد هرع العامل إلى أيقونة المتصفح browser ليطمس منه سجل المستخدم السابق وذلك - على ما يبدو - لكي لا أ لقي نظرة على ما كان يفعله من جاء قبلي. لم تسعفني خبرتي إذ ذاك في تفسر مغزى ذلك التصرف

掌握比特币-开始赚取比特币的指导: New Moon (Vampyre Ser.)

by Adidas Wilson 顺宏

比特币是由名不副实的程序员或者一群程序员发明的一种加密货币和数字支付系统,名叫Satoshi Nakamoto。 它在2009年作为开源软件发布。 系统是点对点的,交易是直接在用户之间进行的,没有中间人。 这些交易由网络节点验证,并记录在称为区块链的公共分布式账本中。 由于该系统没有中央存储库或单个管理员,比特币被称为第一个分散数字货币。 比特币除了被创造为挖矿的奖励外,还可以在合法或黑市交换其他货币,产品和服务。 截至2015年2月,超过10万商户和供应商接受比特币作为付款。 根据剑桥大学2017年的研究报告,使用加密货币钱包的用户数量达到2.9-580万,其中大部分使用比特币。

Digital Art Masters: Volume 4 (Digital Art Masters Series)

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 4 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breaktaking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. This book offers inspiration and insight for the advanced amateur and professional CG artists. The Digital Art Masters series has expanded upon the competition's gallery book concept and has added the insight and experiences of professional CG artists worldwide. Divided into 5 sections, Sci-Fi, Scene, Fantasy, Character and Cartoon, Each featured artist segement will include the thought processes behind creating unique digital images and an artist portfolio for further inspiration. Find your inspiration and discover the tips, tricks and techniques that really work.

Digital Art Masters: Volume 2

by 3dtotal.Com

Meet some of the finest digital 2D and 3D artists working in the industry today, from Patrick Beaulieu, Philip Straub, Benita Winckler, Alessandro Baldasseroni to Khalid Al Muharraqi, Marcel Baumann and Marek Denko and see how they work. More than just a gallery book - in Digital Arts Masters each artist has written a breakdown overview, with supporting imagery of how they made there piece of work.With Digital Arts Masters you'll understand the artists' thought process and discover the tips, tricks and techniques which really work.

Digital Art Masters: Volume 5

by 3dtotal.Com

Meet some of the finest 2D and 3D artists working in the industry today and discover how they create some of the most innovative digital art in the world. More than a gallery book or a coffee table book- Digital Art Masters Volume 5 includes over 50 artists and 900 unique and stunning 2D and 3D digital art. Beyond the breath taking images is a breakdown of the techniques, challenges and tricks the artists employed while creating stunning imagery. This volume, much like the previous volumes is not your standard coffee table book nor is it our usual how-to-book. New to this volume will be 5 artist video tutorials. Five artists will specifically detail an aspect of their gallery image from start to finish, offering further technique driven insight and expertise offering 2 ½ hours of additional inspiration. With a click of a mouse, artists willbe able to apply the leading techniques to their own work with access to additional video tutorials, source files, textures and digital brushes at the companion website: http://www.focalpress.com/digital-art-masters/index.html.

Digital Painting Techniques: Masters Collection

by 3dtotal.Com

Discover the tips, tricks and techniques that really work for concept artists, matte painters and animators. Compiled by the team at 3dtotal.com, Digital Painting Techniques, Volume 1 offers digital inspiration with hands-on insight and techniques from professional digital artists. More than just a gallery book - within Digital Painting Techniques each artist has written a breakdown overview, with supporting imagery of how they made their piece of work. Beginner and intermediate digital artists will be inspired by the gallery style collection of the finest examples of digital painting from world renowned digital artists. Start your mentorship into the world of digital painting today with some of the greatest digital artists in the world and delve into professional digital painting techiques, such as speed painting, custom brush creation and matte painting. Develop your digital painting skills beyond the variety of free online digital painting tutorials and apply the most up to date techniques to your digital canvas with Digital Painting Techniques for Animators.

CWNA Certified Wireless Network Administrator Official Study Guide

by David A. Coleman David D. Westcott

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802. 11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP's website at www. cwnp. com/sybex.

Packet Tracer Network Simulator

by Jesin A

A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer. Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

Photoshop CS2 RAW

by Mikkel Aaland

The RAW file format is the uncompressed data file captured by a digital camera's electronic sensor. When your camera saves an image in RAW format, settings like white balance, sharpening, contrast and saturation are not applied to the image but are saved instead in a separate header. Because RAW files remain virtually untouched by in-camera processing, they are essentially the digital equivalent to exposed but undeveloped film. This makes RAW an increasingly popular format with amateur and professional digital photographers, because it affords greater flexibility and control during the editing process-if you know how to work with RAW files. Most digital camera manufacturers supply their own software for converting RAW data, as do some third party vendors. Increasingly, however, the RAW converter of choice is a plug-in included in the latest version of Adobe Photoshop, the most popular and widely-used digital image editing tool in the world. Adobe Photoshop CS2 is emerging as the best place to edit RAW images, and the best way to master this new format is with Photoshop CS2 RAW. An important book dedicated to working with RAW in Photoshop, this comprehensive guide features a unique design that helps readers grasp the subject through visual instruction and prompts. The entire RAW process is explored, from shooting to using the Adobe plug-in converter and new Bridge navigation software. The primary focus of Photoshop RAW is, as the title suggests, Photoshop editing technique: automating RAW workflow, correcting exposures, extending exposure range, manipulating grayscale and working with the new DNG (Digital Negative) open standard that Adobe supports. Presented by photographer Mikkel Aaland, a pioneer of digital photography and author of eight books, including O'Reilly's Photoshop for the Web and the award-winning Shooting Digital, Photoshop CS2 RAW investigates and instructs in an accessible visual style. Required reading for professionals and dedicated photo hobbyists alike.

Microsoft Dynamics AX 2012 Financial Management

by Mohamed Aamer

This book is a practical, hands-on guide that covers both the basic and advanced concepts of financial management using Microsoft Dynamics AX.Microsoft Dynamics AX Financial Management is for Microsoft Dynamics AX solution architects, application consultants, support engineers, pre-technical sales consultants, and project managers on the partner side, as well as chief financial officers, financial controllers, accounting managers, key users, business analysts, and chief information officers on the customer side. A basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies will help you better understand the concepts covered in this book.

Microsoft Dynamics AX 2012 R3 Financial Management

by Mohamed Aamer

This book is intended for application consultants, controllers, CFOs, and other professionals who are engaged in a Microsoft Dynamics AX implementation project. Basic knowledge of financial terms, concepts, and Microsoft Dynamics AX terminologies is required.

Quantum Computing since Democritus

by Scott Aaronson

Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists

by Frank Abagnale

Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks.Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: * The best way to protect your phone from being hacked * The only time you should ever use a debit card * The one type of photo you should never post on social media * The only conditions under which you should use WiFi networks at the airport * The safest way to use an ATM With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet.

Numerische Methoden für Ingenieure: mit Anwendungsbeispielen in Python

by Bilen Emek Abali Celal Çakıroğlu

Technische Systeme werden von Ingenieur*innen modelliert und durch numerische Methoden simuliert. Dieses Lehrbuch bietet eine unkomplizierte Einführung in numerische Methoden, mit zahlreichen, praxisrelevanten Beispielen, die mithilfe der Programmiersprache Python gelöst werden. In ingenieurwissenschaftlichen Studienrichtungen sowie in allen Forschungsprojekten sind numerische Simulationen unumgänglich, geeignete Methoden aber oft schwierig zu begreifen. Hier erklären Ingenieure die mathematischen Grundlagen der numerischen Methoden in sachlicher, dennoch simpler Sprache, mit konkreten Anwendungsbeispielen auf Papier und am Bildschirm. Die Besonderheit in diesem Buch ist, dass nicht nur Modelle der physikalischen Systeme berechnet und experimentelle Daten bearbeitet werden, sondern der Code in Python Zeile für Zeile angegeben und erklärt wird. Über die Autoren: B. E. Abali arbeitet als Dozent an der Technischen Universität Berlin sowie der Türkisch-Deutschen Universität in Istanbul, und hat an der Technischen Universität München, University of California Berkeley in den USA und Ghent University in Belgien geforscht. C. Çakıroğlu ist Dozent an der Türkisch-Deutschen Universität in Istanbul und hat an der Technischen Universität Braunschweig, dem DLR (Deutsches Zentrum für Luft- und Raumfahrt) und der University of Alberta in Kanada geforscht.

Predicting the Future

by Henry Abarbanel

Through the development of an exact path integral for use in transferring information from observations to a model of the observed system, the author provides a general framework for the discussion of model building and evaluation across disciplines. Through many illustrative examples drawn from models in neuroscience, geosciences, and nonlinear electrical circuits, the concepts are exemplified in detail. Practical numerical methods for approximate evaluations of the path integral are explored, and their use in designing experiments and determining a model's consistency with observations is explored.

Applications and Usability of Interactive TV: 5th Iberoamerican Conference, jAUTI 2016, La Habana, Cuba, November 21-25, 2016, Revised Selected Papers (Communications in Computer and Information Science #689)

by María José Abásolo Pedro Almeida Joaquín Pina Amargós

This book constitutes the refereed proceedings of the 5th Iberoamerican Conference on Applications and Usability of Interactive TV , jAUTI 2016, held in conjunction with the III International Congress on Information Engineering and Information Systems, in La Habana, Cuba, in November 2016. The 11 full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on IDTV content production and recommendation; video consumption and preservation; social TV; IDTV interaction techniques; IDTV user experiences.

Applications and Usability of Interactive TV: 7th Iberoamerican Conference, jAUTI 2018, Bernal, Argentina, October 16–18, 2018, Revised Selected Papers (Communications in Computer and Information Science #1004)

by María José Abásolo Telmo Silva Nestor D. González

This book constitutes the refereed proceedings of the 7th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2018, in Bernal, Argentina, in October 2018.The 13 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Contexts of application of the IDTV; Design and Implementation Techniques of IDTV Content and Services; Interaction Techniques, Technologies and Accesibility of IDTV Services; Testing and User Experience of IDTV Services.

Hybrid Systems Biology

by Alessandro Abate David Šafránek

This book constitutes the thoroughly referred post-workshop proceedings of the 4th International Workshop on Hybrid Systems biology, HSB 2015, held as part of the Madrid Meet 2015 event, in Madrid, Spain in September 2015. The volume presents 13 full papers together with 2 abstracts of invited sessions from 18 submissions. The scope of the HSB workshop is the general area of dynamical models in Biology with an emphasis on hybrid approaches -- by no means restricted to a narrow class of mathematical models -- and taking advantage of techniques developed separately in different areas.

Curves and Surfaces (UNITEXT)

by M. Abate F. Tovena

The book provides an introduction to Differential Geometry of Curves and Surfaces. The theory of curves starts with a discussion of possible definitions of the concept of curve, proving in particular the classification of 1-dimensional manifolds. We then present the classical local theory of parametrized plane and space curves (curves in n-dimensional space are discussed in the complementary material): curvature, torsion, Frenet's formulas and the fundamental theorem of the local theory of curves. Then, after a self-contained presentation of degree theory for continuous self-maps of the circumference, we study the global theory of plane curves, introducing winding and rotation numbers, and proving the Jordan curve theorem for curves of class C2, and Hopf theorem on the rotation number of closed simple curves. The local theory of surfaces begins with a comparison of the concept of parametrized (i.e., immersed) surface with the concept of regular (i.e., embedded) surface. We then develop the basic differential geometry of surfaces in R3: definitions, examples, differentiable maps and functions, tangent vectors (presented both as vectors tangent to curves in the surface and as derivations on germs of differentiable functions; we shall consistently use both approaches in the whole book) and orientation. Next we study the several notions of curvature on a surface, stressing both the geometrical meaning of the objects introduced and the algebraic/analytical methods needed to study them via the Gauss map, up to the proof of Gauss' Teorema Egregium. Then we introduce vector fields on a surface (flow, first integrals, integral curves) and geodesics (definition, basic properties, geodesic curvature, and, in the complementary material, a full proof of minimizing properties of geodesics and of the Hopf-Rinow theorem for surfaces). Then we shall present a proof of the celebrated Gauss-Bonnet theorem, both in its local and in its global form, using basic properties (fully proved in the complementary material) of triangulations of surfaces. As an application, we shall prove the Poincaré-Hopf theorem on zeroes of vector fields. Finally, the last chapter will be devoted to several important results on the global theory of surfaces, like for instance the characterization of surfaces with constant Gaussian curvature, and the orientability of compact surfaces in R3.

Recent Advances on Soft Computing and Data Mining

by Jemal H. Abawajy Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book offers a systematic overview of the concepts and practical techniques that readers need to get the most out of their large-scale data mining projects and research studies. It guides them through the data-analytical thinking essential to extract useful information and obtain commercial value from the data. Presenting the outcomes of International Conference on Soft Computing and Data Mining (SCDM-2017), held in Johor, Malaysia on February 6-8, 2018, it provides a well-balanced integration of soft computing and data mining techniques. The two constituents are brought together in various combinations of applications and practices. To thrive in these data-driven ecosystems, researchers, engineers, data analysts, practitioners, and managers must understand the design choice and options of soft computing and data mining techniques, and as such this book is a valuable resource, helping readers solve complex benchmark problems and better appreciate the concepts, tools, and techniques employed.

Recent Advances on Soft Computing and Data Mining: Proceedings of the Fourth International Conference on Soft Computing and Data Mining (SCDM 2020), Melaka, Malaysia, January 22–⁠23, 2020 (Advances in Intelligent Systems and Computing #978)

by Jemal H. Abawajy Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book provides an introduction to data science and offers a practical overview of the concepts and techniques that readers need to get the most out of their large-scale data mining projects and research studies. It discusses data-analytical thinking, which is essential to extract useful knowledge and obtain commercial value from the data. Also known as data-driven science, soft computing and data mining disciplines cover a broad interdisciplinary range of scientific methods and processes. The book provides readers with sufficient knowledge to tackle a wide range of issues in complex systems, bringing together the scopes that integrate soft computing and data mining in various combinations of applications and practices, since to thrive in these data-driven ecosystems, researchers, data analysts and practitioners must understand the design choice and options of these approaches. This book helps readers to solve complex benchmark problems and to better appreciate the concepts, tools and techniques used.

Advances on Computational Intelligence in Energy: The Applications of Nature-Inspired Metaheuristic Algorithms in Energy (Green Energy and Technology)

by Jemal H. Abawajy Tutut Herawan Haruna Chiroma

Addressing the applications of computational intelligence algorithms in energy, this book presents a systematic procedure that illustrates the practical steps required for applying bio-inspired, meta-heuristic algorithms in energy, such as the prediction of oil consumption and other energy products. Contributions include research findings, projects, surveying work and industrial experiences that describe significant advances in the applications of computational intelligence algorithms in energy. For easy understanding, the text provides practical simulation results, convergence and learning curves as well as illustrations and tables. Providing a valuable resource for undergraduate and postgraduate students alike, it is also intended for researchers in the fields of computational intelligence and energy.

Proceedings of the International Conference on Data Engineering 2015 (Lecture Notes in Electrical Engineering #520)

by Jemal H. Abawajy Tutut Herawan Rozaida Ghazali Mustafa Mat Deris Mohamed Othman Hairulnizam Mahdin

These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: • Data engineering • Big data • Data and knowledge visualization • Data management • Data mining and warehousing • Data privacy & security • Database theory • Heterogeneous databases • Knowledge discovery in databases • Mobile, grid and cloud computing • Knowledge management • Parallel and distributed data • Temporal data • Web data, services and information engineering • Decision support systems • E-Business engineering and management • E-commerce and e-learning • Geographical information systems • Information management • Information quality and strategy • Information retrieval, integration and visualization • Information security • Information systems and technologies

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence (Advances in Intelligent Systems and Computing #1017)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Mohammed Atiquzzaman Zheng Xu

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Refine Search

Showing 1 through 25 of 34,193 results