Browse Results

Showing 24,426 through 24,450 of 61,674 results

blogdown: Creating Websites with R Markdown (Chapman & Hall/CRC The R Series)

by Alison Hill Yihui Xie Amber Thomas

blogdown: Creating Websites with R Markdown provides a practical guide for creating websites using the blogdown package in R. In this book, we show you how to use dynamic R Markdown documents to build static websites featuring R code (or other programming languages) with automatically rendered output such as graphics, tables, analysis results, and HTML widgets. The blogdown package is also suitable for technical writing with elements such as citations, footnotes, and LaTeX math. This makes blogdown an ideal platform for any website designed to communicate information about data science, data analysis, data visualization, or R programming. Note that blogdown is not just for blogging or sites about R; it can also be used to create general-purpose websites. By default, blogdown uses Hugo, a popular open-source static website generator, which provides a fast and flexible way to build your site content to be shared online. Other website generators like Jekyll and Hexo are also supported. In this book, you will learn how to: Build a website using the blogdown package; Create blog posts and other website content as dynamic documents that can be easily edited and updated; Customize Hugo templates to suit your site’s needs; Publish your website online; Migrate your existing websites to blogdown and Hugo. Yihui Xie is a software engineer at RStudio. He has authored and co-authored several R packages, including knitr, rmarkdown, bookdown, blogdown, shiny, xaringan, and animation. He has published two other books, Dynamic Documents with R and knitr and bookdown: Authoring Books and Technical Documents with R Markdown. Amber Thomas is a data journalist and "maker" at the online publication of visual essays: The Pudding (https://pudding.cool). Her educational background was marine biology, but she has a strong love of data analysis, visualization, and storytelling. Alison Presmanes Hill is an Associate Professor of Pediatrics at Oregon Health & Science University, where she teaches Computer Science courses on data analysis, data science, and visualization. Her research focuses on using computational methods to study the development of children with neurodevelopmental disorders, in particular Autism Spectrum Disorders.

Agilizing the Enterprise

by Joseph Raynus

Are you still searching for the workplace that deserves someone like you? Do you really have a good understanding about what is going on out there, in the business world? In this book, we will discuss the importance of agility and how it affects the solutions that are being delivered by an organization. We will also talk about how a blend of strategic innovation, visionary leadership, and organizational agility go hand in hand to ensure the success of an organization. Enterprise agility is not a far-fetched possibility. Once the problems of the organization are identified, with the right tools and effort, the agility, efficiency, and effectiveness of an organization, as well as the processes that the success of the organization are based on, can all be maximized. This book will broaden your thinking and will help you expand your horizons.

Artificial Intelligence and the Two Singularities (Chapman & Hall/CRC Artificial Intelligence and Robotics Series)

by Calum Chace

The science of AI was born a little over 60 years ago, but for most of that time its achievements were modest. In 2012 it experienced a big bang, when a branch of statistics called Machine Learning (and a sub-branch called Deep Learning) was applied to it. Now machines have surpassed humans in image recognition, and they are catching up with us at speech recognition and natural language processing. Every day, the media reports the launch of a new service, a new product, and a new demonstration powered by AI. When will it end? The surprising truth is, the AI revolution has only just begun. Artificial Intelligence and the Two Singularities argues that in the course of this century, the exponential growth in the capability of AI is likely to bring about two "singularities" - points at which conditions are so extreme that the normal rules break down. The first is the economic singularity, when machine skill reaches a level that renders many of us unemployable and requires an overhaul of our current economic and social systems. The second is the technological singularity, when machine intelligence reaches and then surpasses the cognitive abilities of an adult human, relegating us to the second smartest species on the planet. These singularities will present huge challenges, but this book argues that we can meet these challenges and overcome them. If we do, the rewards could be almost unimaginable. This book covers: • Recent developments in AI and its future potential • The economic singularity and the technological singularity in depth • The risks and opportunities presented by AI • What actions we should take Artificial intelligence can turn out to be the best thing ever to happen to humanity, making our future wonderful almost beyond imagination. But only if we address head-on the challenges that it will raise. Calum Chace is a best-selling author of fiction and non-fiction books and articles, focusing on the subject of artificial intelligence. He is a regular speaker on artificial intelligence and related technologies, and runs a blog on the subject at www.pandoras-brain. com. Prior to becoming a full-time writer and speaker, he spent 30 years in business as a marketer, a strategy consultant, and a CEO. He studied philosophy at Oxford University, where he discovered that the science fiction he had been reading since boyhood was simply philosophy in fancy dress.

Enterprise Cloud Computing for Non-Engineers (Technology for Non-Engineers)

by Stephan Jones Frank Groom

This book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.

The Entrepreneurial Project Manager (Best Practices in Portfolio, Program, and Project Management)

by Chris Cook

Doing more with less is a skill mastered by entrepreneurs. Budgets are tight, deadlines are short, and time is of the essence. Entrepreneurial project managers use these parameters to their benefit. Hurdling over obstacles with the bare minimum of effort makes their projects and teams stand out. Focusing inward to develop the skills and mindset necessary to accomplish anything with anyone sets an entrepreneurial project manager apart from the group. This book builds on the basics of project management knowledge with tools and techniques to get you as well as your projects and teams performing on an advanced level. No matter your industry or experience level, this book gives you practical ways to improve any project. More importantly, it shows how you can improve your own performance. The biggest improvements a project manager can make are about him- or herself. Personal limitations can be the hardest obstacle to overcome, and this book explains how to overcome them. The techniques have been tried and tested by the author who shares them with you in this book. Whether in your projects or career, all the right things can be said and done, yet the results are always unpredictable. We all have little control over events. This book’s tools and techniques give you the ability to handle anything that may come your way. Entrepreneurs are constantly changing and adapting to the world around them. They must stay cutting-edge to make their businesses thrive. This book explains how to take a cutting-edge approach to project management. The goal is to take your technical skills as a project manager, add the elements of an entrepreneur, and create a high-powered team around you as well as become the best project manager you can be.

Browsers, Devices, and Fonts: A Designer's Guide to Fonts and How They Function on the Web

by Gary Rozanc

Part technical and part theoretical, this practical guide to web typography helps designers understand how the typographic choices they make in layout and prototyping programs behave once they are turned into live code. Through a series of demos, this book teaches designers how to create typographic specific webpages by learning just enough HTML and CSS to be able to view the pages in different browsers, devices, and operating systems. With live webpages to evaluate, designers will learn how to test those pages for supported features and performance, ensuring font choices look as good in the browser as it does in their layout program, delivering a speedy experience to the users. Key Features Demonstrates the minimal amount of HTML and CSS necessary to be able to create webpages to see typographic choices in the browser. Discusses responsive design and how to evaluate and test those choices for performance and usability prior to front-end development. Demonstrates how to review your own typographic, image, and layout choices in the browser through a series of demos in the book.

Botnets: Architectures, Countermeasures, and Challenges (Series in Security, Privacy and Trust)

by Peng Zhou Weizhi Meng Georgios Kambourakis Marios Anagnostopoulos

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Circuits and Systems for Security and Privacy (Devices, Circuits, and Systems)

by Farhana Sheikh Leonel Sousa

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.

Artificial Intelligence: A Beginner's Guide (Beginner's Guides)

by Blay Whitby

Tomorrow begins right here as we embark on an enthralling and jargon-free journey into the world of computers and the inner recesses of the human mind. Readers encounter everything from the nanotechnology used to make insect-like robots, to computers that perform surgery, in addition to discovering the biggest controversies to dog the field of AI. Blay Whitby is a Lecturer on Cognitive Science and Artificial Intelligence at the University of Sussex UK. He is the author of two books and numerous papers.

Cloud Computing Security: Foundations and Challenges

by John Vacca

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

Driver Reactions to Automated Vehicles: A Practical Guide for Design and Evaluation (Transportation Human Factors)

by Neville Stanton Alexander Eriksson

Driver Reactions to Automated Vehicles focuses on the design and evaluation of the handover to and from driver and the automobile. The authors present evidence from studies in driving simulators and on the open roads to show that handover times are much longer than anticipated by previous research. In the course of the studies, Eriksson and Stanton develop compelling evidence to support the use of driving simulators for the study of handovers. They also develop guidelines for the design of handover strategies and show how this improves driver takeover of vehicle control. Features Provides a history of automobile automation Offers a contemporary analysis of the state of automobile automation Includes novel approaches in examining driver-automation interaction Presents studies of automation in driving simulators Includes on-road studies of driver automation Covers guidelines for design of vehicle automation

Data-ism: Inside the Big Data Revolution

by Steve Lohr

Coal, iron ore and oil were the fuel of the Industrial Revolution. Today's economies and governments are powered by something far less tangible: the explosive abundance of digital data.Steve Lohr, the New York Times' chief technology reporter, charts the ascent of Data-ism, the dominating philosophy of the day in which data is at the forefront of everything and decisions of all kinds are based on data analysis rather than experience and intuition. Taking us behind the scenes and introducing the DOPs (Data Oriented-People), the key personalities behind this revolution, he reveals how consuming the bits and bytes of the masses is transforming the nature of business and governance in unforeseen ways. But what are losing in the process and what new dangers await?

The Spy In The Coffee Machine: The End of Privacy as We Know It

by Kieron O'Hara Nigel Shadbolt

What do you know about the new surveillance state that has been created in the wake of pervasive computing - that is, the increasing use of very small and simple computers in all sorts of host - from your computer to your coat? Well, these little computers can communicate via the web and form powerful networks whose emergent behaviour can be very complex, intelligent, and invasive. The question is: how much of an infringement on privacy are they? Could these intelligent networks be used by governments, criminals or terrorists to undermine privacy or commit crimes? From CCTVs to blogging, from cookies to RFID tags, we are sleepwalking into a new state of global hypersurveillance. And when even cans of Coke are connected to the internet, the risk of someone misusing this information is very high indeed. Kieron O'Hara is Senior Research Fellow in Electronics and Computer Science at the University of Southampton, UK. Nigel Shadbolt is Professor of Artificial Intelligence at the University of Southampton, UK, and was President of the British Computer Society in 2006-7.

C++ Data Structures and Algorithm Design Principles: Leverage the power of modern C++ to build robust and scalable applications

by John Carey Shreyans Doshi Payas Rajan

Get started with C++ programming by learning how to build applications using its data structures and algorithms Key Features Explore data structures such as arrays, stacks, and graphs with real-world examples Study the trade-offs between algorithms and data structures and discover what works and what doesn't Discover how techniques such as bloom filters and multi-way heaps boost real-world applications Book Description C++ is a mature multi-paradigm programming language that enables you to write high-level code with a high degree of control over the hardware. Today, significant parts of software infrastructure, including databases, browsers, multimedia frameworks, and GUI toolkits, are written in C++. This book starts by introducing C++ data structures and how to store data using linked lists, arrays, stacks, and queues. In later chapters, the book explains the basic algorithm design paradigms, such as the greedy approach and the divide-and-conquer approach, which are used to solve a large variety of computational problems. Finally, you will learn the advanced technique of dynamic programming to develop optimized implementations of several algorithms discussed in the book. By the end of this book, you will have learned how to implement standard data structures and algorithms in efficient and scalable C++ 14 code. What you will learn Build applications using hash tables, dictionaries, and sets Explore how modern hardware affects the actual run-time performance of programs Apply common algorithms such as heapsort and merge sort for string data types Use C++ template metaprogramming to write code libraries Implement a URL shortening service using a bloom filter Use appropriate modern C++ idioms such as std:: array instead of C-style arrays Who this book is for This book is for developers or students who want to revisit basic data structures and algorithm design techniques. Although no mathematical background is required, basic knowledge of complexity classes and Big O notation along with a qualification in an algorithms course will help you get the most out of this book. Familiarity with C++ 14 standard is assumed.

Security+® Practice Tests: Prepare for, practice, and pass the CompTIA Security+ exam

by Mike Chapple

Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ exam Key Features Get a detailed breakdown of the type of questions and the exam environment Discover a step-by-step process that guides you through the study process week-by-week Reinforce your learning by solving 100 questions for each domain Book Description Security+ certification is the most popular entry-level certification for cybersecurity professionals. It has no work experience requirement, making it accessible to everyone willing to put in the time to prepare for the exam. Security+? Practice Tests are the perfect tools to prepare for the CompTIA Security+ exam. The first six chapters each cover one of the six Security+ domains. Each of those chapters contains around 100 practice test questions covering the material from that domain. The last two chapters each contain a full-length Security+ practice test that's designed to assess your readiness to take the actual test. At the end of each chapter, you'll find the answers to all of the questions along with detailed explanations to help reinforce your learning of the material. By the end of the book, you'll have enough practice to easily ace the CompTIA Security+ exam. What you will learn Familiarize yourself with the format of the Security+ exam Target your test preparation on each of the Security+ domains Brush up on your understanding by testing yourself on realistic practice questions Discover areas for improvement by comparing your responses to the answers provided Measure your readiness with full-length practice tests Know what to expect on test day and Learn helpful strategies for tackling the different question types Who this book is for This book is designed for service desk analysts, system support engineers, and other IT professionals who want to start their career in managing the IT infrastructure of an organization. Basic knowledge of hardware, software, other relevant components of the IT industry will help you easily grasp the concepts explained in this book.

To Pixar and Beyond: My Unlikely Journey with Steve Jobs to Make Entertainment History

by Lawrence Levy

A Sunday Times Best Book of the Year 2017 One day in November 1994, Lawrence Levy received a phone call out of the blue from Steve Jobs, whom he&’d never met, offering him a job running Pixar, a little-known company that had already lost Jobs $50 million. With Pixar&’s prospects looking bleak, it was with some trepidation that Levy accepted the position. After a few weeks he discovered that the situation was even worse than he&’d imagined. Pixar&’s advertising division just about broke even, its graphics software had few customers, its short films didn&’t make any money and, on top of all that, Jobs was pushing to take the company public. Everything was riding on the studio&’s first feature film, codenamed Toy Story, and even then it would have to be one of the most successful animated features of all time… Full of wisdom on bringing business and creativity together, and recounting the touching story of Levy&’s enduring friendship with Jobs, To Pixar and Beyond is a fascinating insider&’s account of one of Hollywood&’s greatest success stories.

The Know-It-Alls: The Rise of Silicon Valley as a Political Powerhouse and Social Wrecking Ball

by Noam Cohen

The world&’s tech giants are at the centre of controversies over fake news, free speech and hate speech on platforms where influence is bought and sold. Yet, at the outset, almost everyone thought the internet would be a positive, democratic force, a space where knowledge could be freely shared to enable everyone to make better-informed decisions. How did it all go so wrong? Noam Cohen reports on the tech libertarians of Silicon Valley, from the self-proclaimed geniuses Jeff Bezos, Peter Thiel, Reid Hoffman and Mark Zuckerberg to the early pioneers at Stanford University, who have not only made the internet what it is today but reshaped society in the process. It is the story of how the greed, bias and prejudice of one neighbourhood is fracturing the Western world.

Otherworld: Last Reality Series (Last Reality Ser. #1)

by Kirsten Miller Jason Segel

"Full of high stakes, thrillers, and fantastic twists and turns, fans of Ready Player One are sure to love this addictive read." —BUZZFEED Welcome to real life 2.0. Are you ready to play? There are no screens. There are no controls. You don&’t just see and hear it – you taste, smell, and touch it too. In this new reality there are no rules to follow, no laws to break. You can live your best life. It&’s a game so addictive you&’ll never want it to end. Until you realize that you&’re the one being played. Step into Otherworld. Leave your body behind. The frightening future that Jason Segel and Kirsten Miller have imagined is not far away. Otherworld asks the question we'll all soon be asking: if technology can deliver everything we want, how much are we willing to pay?

Democracy Hacked: How Technology is Destabilising Global Politics

by Martin Moore

Technology has fractured democracy, and now there&’s no going back. All around the world, the fringes have stormed the palace of the elites and unleashed data miners, dark ads and bots on an unwitting public. After years of soundbites about connecting people, the social media giants are only just beginning to admit to the scale of the problem. We stand on the precipice of an era where switching your mobile platform will have more impact on your life than switching your government. Where freedom and privacy are seen as incompatible with social well-being and transparency. Where your attention is sold to the highest bidder. Our laws don&’t cover what is happening and our politicians don&’t understand it. But if we don&’t fight to change the system now, we may not get another chance.

Superminds: How Hyperconnectivity is Changing the Way We Solve Problems

by Thomas W. Malone

Is Apple conscious? Could a cyber–human system sense a potential terrorist attack? Or make diagnosing a rare and little-known disease routine? Computers are not replacing us: they are enhancing us. Different intelligences are joining together to do things we thought were impossible. Whether it&’s devising innovations to tackle climate change, helping job seekers and employers find one another, or identifying the outbreak of a serious disease, groups of humans and machines are already working together to solve all sorts of problems. And they will do a lot more. The future will be like another world – a place where we&’ll think differently. In many ways, we are already there.

Global Brand Management: A Guide to Developing, Building & Managing an International Brand

by Laurence Minsky Ilan Geva

In today's hyper-connected world, any brand with a website or digital presence is 'global' by its very definition; yet in practice it takes an enormous amount of strategic planning and adaptability to successfully manage an international brand. Global Brand Management explores the increasingly universal scope of brand management. In an era when many brand managers will find themselves working for large multinationals operating across varied territories, categories and consumer groups, developing an understanding of both the opportunities and risks of multinational brands is truly essential. Meticulously researched, Global Brand Management shows readers how to manage an existing global brand, while simultaneously equipping them with the skills to build one from scratch. The text uses fascinating case studies including Oreo, Harley Davidson and Xiaomi to demonstrate the challenges of maintaining a stable brand identity when operating across territories with different languages, cultural values and logistics. With helpful pedagogy throughout and built-in features to enhance classroom learning, Global Brand Management is the perfect springboard for students to appreciate, enjoy and embrace the nuances and complexities of brand management on an international scale.

Building Evolutionary Architectures: Support Constant Change

by Neal Ford Rebecca Parsons Patrick Kua

The software development ecosystem is constantly changing, providing a constant stream of new tools, frameworks, techniques, and paradigms. Over the past few years, incremental developments in core engineering practices for software development have created the foundations for rethinking how architecture changes over time, along with ways to protect important architectural characteristics as it evolves. This practical guide ties those parts together with a new way to think about architecture and time.

A Tactical Survival Guide For Online Shooting Games

by Andrew Shepperson

This book has been written as a guide to help anyone struggling with online multiplayer First-Person Shooter (FPS) games or even if you just want to sharpen up your existing skills. By reading through the strategies, you should easily improve your game, and become a more formidable opponent. This book covers any potential problems you may encounter during FPS online play and incorporates generic techniques that you will be able to use in all FPS games regardless of their origin, timescale, control system or platform. The things that remain the same in all FPS are the basic tactics and techniques that are employed by some of the worlds best online gamers and some of the world's most formidable military powers. These are the superior tactics that you will be able to utilise in any FPS game you play and will keep you one step ahead of any player.

Machine Learning with Spark and Python: Essential Techniques for Predictive Analytics

by Michael Bowles

Machine Learning with Spark and Python Essential Techniques for Predictive Analytics, Second Edition simplifies ML for practical uses by focusing on two key algorithms. This new second edition improves with the addition of Spark—a ML framework from the Apache foundation. By implementing Spark, machine learning students can easily process much large data sets and call the spark algorithms using ordinary Python code. Machine Learning with Spark and Python focuses on two algorithm families (linear methods and ensemble methods) that effectively predict outcomes. This type of problem covers many use cases such as what ad to place on a web page, predicting prices in securities markets, or detecting credit card fraud. The focus on two families gives enough room for full descriptions of the mechanisms at work in the algorithms. Then the code examples serve to illustrate the workings of the machinery with specific hackable code.

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto

by Roger A. Grimes

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day—HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication—will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Refine Search

Showing 24,426 through 24,450 of 61,674 results