Résultats de recherche de titre
Articles 1 à 20 sur 2686
Comprendre l'intelligence artificielle (L'Encyclopédie d'Utovie)
Par Louis Belon. 2023
Un ouvrage pour faire toute la lumière sur l'intelligence artificielle qui, selon l'auteur, ne constitue pas un mal en soi…
mais qui nécessite de s'interroger sur celles et ceux qui sont à l'origine de cet outil.Beverly hills spy: The double-agent war hero who helped japan attack pearl harbor
Par Ronald Drabkin. 2024
In the spirit of Ben Macintyre's greatest spy nonfiction, the truly unbelievable and untold story of Frederick Rutland—a debonair British…
WWI hero, flying ace, fixture of Los Angeles society, and friend of Golden Age Hollywood stars—who flipped to become a spy for Japan in the lead-up to the attack on Pearl Harbor. Frederick Rutland was an accomplished aviator, British WWI war hero, and real-life James Bond. He was the first pilot to take off and land a plane on a ship, a decorated warrior for his feats of bravery and rescue, was trusted by the admirals of the Royal Navy, had a succession of aeronautical inventions, and designed the first modern aircraft carrier. He was perhaps the most famous early twentieth-century naval aviator. Despite all of this, and due mostly to class politics, Rutland was not promoted in the new Royal Air Force in the wake of WWI. This ignominy led the disgruntled Rutland to become a spy for the Japanese navy. Plied with riches and given a salary ten times the highest-paid admiral, shuttled between Los Angeles and Tokyo where he lived in large mansions in both Beverly Hills and Yokohama, and insinuating himself into both LA high society and Japan's high command, Rutland would go on to contribute to the Japanese navy with both strategic and technical intelligence. This included scouting trips to Pearl Harbor, investigations of military preparedness, and aircraft technology. All this while living a double life, frequenting private California clubs and hosting lavish affairs for Hollywood stars and military dignitaries in his mansion on the Los Angeles Bird Streets. Supported by recently declassified FBI files and by incorporating unique and rare research through MI5 and Japanese Naval archives that few English speakers have access to, author Ronald Drabkin pieces together to completion, for the first time, this stranger-than-fiction story of one of the most fascinating and enigmatic characters of espionage history. Supplemental enhancement PDF accompanies the audiobookBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseNGINX Cookbook
Par Derek DeJonghe. 2024
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load…
balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source or commercial offering to solve problems in various use cases.For professionals who understand modern web architectures, such as n-tier or microservice designs and common web protocols such as TCP and HTTP, these recipes provide proven solutions for security and software load balancing and for monitoring and maintaining NGINX's application delivery platform. You'll also explore advanced features of both NGINX and NGINX Plus, the free and licensed versions of this server.You'll find recipes for:High-performance load balancing with HTTP, TCP, and UDPSecuring access through encrypted traffic, secure links, HTTP authentication subrequests, and moreDeploying NGINX to Google, AWS, and Azure cloudSetting up and configuring NGINX ControllerInstalling and configuring the NGINX App Protect moduleEnabling WAF through Controller ADCNGINX Instance Manager, Service Mesh, and the njs moduleVision and Actualization in Academia: Georgia Tech’s College of Computing (History of Computing)
Par Peter A. Freeman. 2024
Although difficult, change in academic structures is necessary today, especially in fast-changing fields today such as biology, computing, management, the…
social sciences, and others. This includes changes within existing organizations as well as creation of new structures and reorganizations or eliminations of older ones. This narrative attempts first to document the historical rise of an organization, Georgia Tech’s College of Computing, that has touched and successfully changed the lives of thousands of people. Second, it aims to identify and explicate some of what has led to this widely acknowledged success. The book provides a chronological narrative that highlights major changes taken under each successive leader. These changes have built on one another, knowingly or otherwise, to create a growing organization that rivals in size and prominence longer established parts of the university. The case study, while of an academic organization focused on computing, provides general lessons applicable almost anywhere. Topics and features: Discusses the nature and uses of visions, both general and specificShows how visions can be used to drive specific actions and resource allocationsIllustrates the choice and use of enduring organizational principlesOutlines a simple strategic-planning method and its applicationIndicates results of this overall approach This book will be of interest to anyone interested in organizational change, especially in academia, and to those interested in Georgia Tech. It will also appeal to policymakers in education, government, and industry; as well as anyone interested in the historical growth of the computing milieu broadly. Peter A. Freeman was Founding Dean and Professor in the College of Computing at Georgia Tech from 1990 to 2002. Today he is an Emeritus Dean and Professor.The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector:…
chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and IssuesSmart Grid Risks and ImpactsNetwork and Telecommunications Systems SecurityInfrastructure SecurityAutomobile Security This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Seventeenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2023. Critical Infrastructure Protection XVII is an important resource for researchers, faculty members and graduate students, as well as for as well as for policy makers, practitioners and other individuals with interests in homeland security.Progress in Landslide Research and Technology, Volume 2 Issue 2, 2023 (Progress in Landslide Research and Technology)
Par Irasema Alcántara-Ayala, Željko Arbanas, David Huntley, Kazuo Konagai, Snježana Mihalić Arbanas, Matjaž Mikoš, Maneesha V. Ramesh, Kyoji Sassa, Shinji Sassa, Huiming Tang, Binod Tiwari. 2023
This open access book provides an overview of the progress in landslide research and technology and is part of a…
book series of the International Consortium on Landslides (ICL). The book provides a common platform for the publication of recent progress in landslide research and technology for practical applications and the benefit for the society contributing to the Kyoto Landslide Commitment 2020, which is expected to continue up to 2030 and even beyond to globally promote the understanding and reduction of landslide disaster risk, as well as to address the 2030 Agenda Sustainable Development Goals.Proceedings of Data Analytics and Management: ICDAM 2023, Volume 4 (Lecture Notes in Networks and Systems #788)
Par Abhishek Swaroop, Zdzislaw Polkowski, Sérgio Duarte Correia, Bal Virdee. 2023
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at…
London Metropolitan University, London, UK, during June 2023. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. The book is divided into four volumes.Current and Future Trends on Intelligent Technology Adoption: Volume 1 (Studies in Computational Intelligence #1128)
Par Mohammed A. Al-Sharafi, Mostafa Al-Emran, Garry Wei-Han Tan, Keng-Boon Ooi. 2023
This book explores current and future trends in adopting intelligent technologies, such as the metaverse, social technologies, FinTech applications, and…
blockchain, among individuals and organizations. The edited book includes empirical and review studies primarily focusing on these issues. This focus aids scholars in conducting future research in the domain and identifying possible future developments of emerging technologies. The empirical studies in the book utilize recent and advanced analytical techniques for data analysis.This unique textbook explicitly addresses the intersection of advanced analytics and procurement. It is motivated by one core question: How…
can firms generate (economic) value from procurement data? It demonstrates that procurement is one of the major functions within a firm where data analytics, artificial intelligence, and operations research can successfully be leveraged to reduce cost and risk and to achieve resilience and sustainability goals.The book provides a methods-based overview of data-driven optimization of purchasing decisions. Besides presenting key concepts and applications, it particularly focuses on implementation, so as to help (future) procurement managers and data scientists quickly evaluate the value generated by a given data-driven solution. What sets this textbook apart is its combination of rigorous, state-of-the-art methodologies from academic research and first-hand experience from various application-oriented consulting projects in a range of industries. Though primarily intended for graduate students with a major in procurement and supply chain management, the book will also benefit purchasing managers with and without specific knowledge of advanced analytics techniques, and data scientists with and without specific experience in procurement.Pattern Recognition and Computer Vision: 6th Chinese Conference, PRCV 2023, Xiamen, China, October 13–15, 2023, Proceedings, Part VIII (Lecture Notes in Computer Science #14432)
Par Qingshan Liu, Hanzi Wang, Zhanyu Ma, Weishi Zheng, Hongbin Zha, Xilin Chen, Liang Wang, Rongrong Ji. 2024
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,…
PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.Für die erfolgreiche Umsetzung von Testautomatisierung im Unternehmen wird konkrete Hilfestellung geboten. Das Buch geht auf unterschiedliche Formen und Ausprägungen…
der Testautomatisierung, ihre Chancen und Risiken und ihren Einsatz in der betrieblichen Praxis ein. Dabei werden sowohl die Auswirkungen auf andere Bereiche (z.B. Anforderungsmanagement, Releasemanagement, Entwicklung) als auch aktuelle Trends beleuchtet. Das Buch enthält weiterhin eine Wirtschaftlichkeitsberechnung zur Einführung von Testautomatisierung, Erläuterungen zu möglichen Metriken als auch die Bewertung der Testautomatisierung mittels Prozessreifemodellen.Learn Programming with C: An Easy Step-by-Step Self-Practice Book for Learning C
Par Sazzad M.S. Imran, Md Atiqur Ahad. 2024
Authored by two standout professors in the field of Computer Science and Technology with extensive experience in instructing, Learn Programming…
with C: An Easy Step-by Step Self-Practice Book for Learning C is a comprehensive and accessible guide to programming with one of the most popular languages. Meticulously illustrated with figures and examples, this book is a comprehensive guide to writing, editing, and executing C programs on different operating systems and platforms, as well as how to embed C programs into other applications and how to create one’s own library. A variety of questions and exercises are included in each chapter to test the readers’ knowledge. Written for the novice C programmer, especially undergraduate and graduate students, this book’s line-by-line explanation of code and succinct writing style makes it an excellent companion for classroom teaching, learning, and programming labs.The Illustrated AWS Cloud: A Guide to Help You on Your Cloud Practitioner Journey
Par Jen Looper, Denise Yu. 2024
An intuitive, fully illustrated guide to Amazon Web Services for the visually oriented In The Illustrated AWS Cloud: A Guide…
to Help You On Your Cloud Practitioner Journey, a team of veteran tech educators delivers a visual and entertaining guide to Amazon Web Services cloud concepts. The authors focus on the job role and responsibilities of an AWS cloud practitioner, guiding readers through choosing the best AWS services for specific use cases. In addition to general cloud concepts, security and compliance, technology, and billing and pricing topics, you’ll find: High-resolution, black-and-white illustrations clearly explaining critical technical concepts Comprehensive coverage of working with an AWS account and understanding the AWS environment Complete chapters on each of the main categories of AWS services, including Compute, Storage, Database, and NetworkingThe authors also provide bonus content on their companion website at https://illustratedaws.cloud/. Perfect for anyone looking for an easy-to-follow and visual introduction to the Amazon Web Services cloud, including those considering a career as a cloud administrator or technical support person, The Illustrated AWS Cloud is an effective resource for business, finance, sales, and marketing professionals who support and collaborate with AWS tech professionals.Big Data, Emerging Technologies and Intelligence: National Security Disrupted (Studies in Intelligence)
Par Miah Hammond-Errey. 2024
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how the…
big data landscape and the emerging technologies it fuels are impacting national security. This book illustrates that big data is transforming intelligence production as well as changing the national security environment broadly, including what is considered a part of national security as well as the relationships agencies have with the public. The book highlights the impact of big data on intelligence production and national security from the perspective of Australian national security leaders and practitioners, and the research is based on empirical data collection, with insights from nearly 50 participants from within Australia’s National Intelligence Community. It argues that big data is transforming intelligence and national security and shows that the impacts of big data on the knowledge, activities and organisation of intelligence agencies is challenging some foundational intelligence principles, including the distinction between foreign and domestic intelligence collection. Furthermore, the book argues that big data has created emerging threats to national security; for example, it enables invasive targeting and surveillance, drives information warfare as well as social and political interference, and challenges the existing models of harm assessment used in national security. The book maps broad areas of change for intelligence agencies in the national security context and what they mean for intelligence communities, and explores how intelligence agencies look out to the rest of society, considering specific impacts relating to privacy, ethics and trust. This book will be of much interest to students of intelligence studies, technology studies, national security and International Relations.Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings (Lecture Notes in Computer Science #14167)
Par Jie Fu, Tomas Kroupa, Yezekael Hayel. 2023
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in…
Avignon, France, during October 18–20, 2023.The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.Beyond Reality: Proceedings of 3rd International Multi-Disciplinary Conference - Theme: Integrated Sciences and Technologies (IMDC-IST 2024) Volume 2 (Lecture Notes in Networks and Systems #876)
Par Mostafa Al-Emran, Jaber H. Ali, Marco Valeri, Alhamzah Alnoor, Zaid Alaa Hussien. 2023
This book explores current research trends in the context of the Metaverse’s impact on the tourism and marketing industries while…
delving into some case studies on education and finance. These trends are examined through various case studies utilizing distinct analytical methods. The chapters are expected to support scholars and postgraduate students in furthering their research in this field and in recognizing prospective advancements in the applications of the Metaverse.This book constitutes the 5th International Workshop, IoTBDH 2023, held in Birmingham, UK, during October 21–25, 2023.The 7 full papers…
and 4 short papers included in this volume were carefully reviewed and selected from 33 submissions. They focus on the state-of-the-art research and applications in utilizing IoT and big data technology for healthcare by presenting efficient scientific and engineering solutions, addressing the needs and challenges for integration with new technologies, and providing visions for future research and development.Active Object Languages: Current Research Trends (Lecture Notes in Computer Science #14360)
Par Frank De Boer, Ferruccio Damiani, Reiner Hähnle, Einar Broch Johnsen, Eduard Kamburjan. 2024
Active Objects are a programming paradigm that supports a non-competitive, data-driven concurrency model. This renders active object languages to be…
well-suited for simulation, data race-free programming, and formal verification. Concepts from active objects made their way into languages such as Rust, ABS, Akka, JavaScript, and Go. This is the first comprehensive state-of-art overview on the subject, the invited contributions are written by experts in the areas of distributed systems, formal methods, and programming languages.Laws of UX: Using Psychology To Design Better Products And Services
Par Jon Yablonski. 2024
An understanding of psychology-specifically the psychology behind how users behave and interact with digital interfaces-is perhaps the single most valuable…
nondesign skill a designer can have. The most elegant design can fail if it forces users to conform to the design instead of working within the "blueprint" of how humans perceive and process the world around them.This practical guide explains how you can apply key principles of psychology to build products and experiences that are more human-centered and intuitive. Author Jon Yablonski deconstructs familiar apps and experiences to provide clear examples of how UX designers can build interfaces that adapt to how users perceive and process digital interfaces.You'll learn:How aesthetically pleasing design creates positive responsesThe principles of psychology most useful for designersHow these psychology principles relate to UX heuristicsPredictive models including Fitts's law, Jakob's law, and Hick's lawEthical implications of using psychology in designA practical framework for applying principles of psychology in your design processThis updated edition includes an even deeper connection to the underlying psychological concepts that govern the principles explored in the book, along with accompanying UX methods and techniques. Examples have been updated to ensure the deconstructed apps and experiences remain familiar and relevant.