Résultats de recherche de titre
Articles 121 à 140 sur 2518
Counterterrorism: Reassessing the Policy Response
Par Benoît Gomis. 2016
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need…
for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Beno�Gomis rOfficial ((ISC)2 Press)
Par Steven Hernandez. 2015
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose…
foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements. Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)(2) and compiled and reviewed by HCISPPs and (ISC)(2) members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.Digital Forensics for Handheld Devices
Par Eamon P. Doherty. 2013
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about…
communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital ForensicsKnowledge Management and E-Learning
Par Jay Liebowitz, Michael S. Frank. 2011
The rapidly growing demand for online courses and supporting technology has resulted in a plethora of structural and functional changes…
and challenges for universities and colleges. These changes have led many distance education providers to recognize the value of understanding the fundamental concepts of both e-learning and knowledge management (KGenome Annotation (Chapman & Hall/CRC Computational Biology Series #46)
Par Jung Soh, Paul M.K. Gordon, Christoph W. Sensen. 2013
The success of individualized medicine, advanced crops, and new and sustainable energy sources requires thoroughly annotated genomic information and the…
integration of this information into a coherent model. A thorough overview of this field, Genome Annotation explores automated genome analysis and annotation from its origins to the challenges of next-generation sequencing data analysis.The book initially takes you through the last 16 years since the sequencing of the first complete microbial genome. It explains how current analysis strategies were developed, including sequencing strategies, statistical models, and early annotation systems. The authors then present visualization techniques for displaying integrated results as well as state-of-the-art annotation tools, including MAGPIE, Ensembl, Bluejay, and Galaxy. They also discuss the pipelines for the analysis and annotation of complex, next-generation DNA sequencing data. Each chapter includes references and pointers to relevant tools. As very few existing genome annotation pipelines are capable of dealing with the staggering amount of DNA sequence information, new strategies must be developed to accommodate the needs of today’s genome researchers. Covering this topic in detail, Genome Annotation provides you with the foundation and tools to tackle this challenging and evolving area. Suitable for both students new to the field and professionals who deal with genomic information in their work, the book offers two genome annotation systems on an accompanying downloadable resources.FISMA Principles and Best Practices: Beyond Compliance
Par Patrick D. Howard. 2011
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements…
have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approPolice Suicide: Is Police Culture Killing Our Officers?
Par Ronald A. Rufo. 2016
There is no question that more police officers die from suicide than those killed in the line of duty. The…
suicide and attempted suicide of police officers is a mental health concern that has been neglected for far too long.Police Suicide: Is Police Culture Killing Our Officers? provides realistic insight into the life of a police officer through aSecuring Systems: Applied Security Architecture and Threat Models
Par Brook S. Schoenfield. 2015
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight…
hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of asSecurity De-Engineering: Solving the Problems in Information Risk Management
Par Ian Tibble. 2012
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing…
something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems iHuman-Computer Etiquette: Cultural Expectations and the Design Implications They Place on Computers and Technology (Supply Chain Integration Modeling, Optimization and Application)
Par Caroline C. Hayes, Christopher A. Miller. 2011
Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke…
human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interGame Design: From Blue Sky to Green Light
Par Deborah Todd. 2007
This book takes a real-world, in-depth journey through the game-design process, from the initial blue sky sessions to pitching for…
a green light. The author discusses the decision and brainstorming phase, character development and story wrap, creation of content and context outlines, flowcharting game play, and creating design documents. Special feThe Tao of Computing (Chapman & Hall/CRC Textbooks in Computing)
Par Henry M. Walker. 2013
Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao…
of Computing, Second Edition presents a comprehensive introduction to computers and computer technology. This edition updates its popular predecessor with new research exercises and expanded discussion questionsRisk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with…
the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing praIntroduction to Corrections
Par David H. McElreath, Linda Keena, Greg Etter, Ellis Stuart Jr.. 2012
Millions in our nation are under some type of judicial sanction, with some individuals behind bars but the majority serving…
their sentences while living and working among us. Introduction to Corrections examines predominant issues related to the system of administering to offenders in the United States. Written in a simple, concise style and enhancReal Time Cameras: A Guide for Game Designers and Developers
Par Mark Haigh-Hutchinson. 2009
The control of cameras is as important in games as it is in cinema. How the camera tracks and moves…
determines our point of view and influences our attitude towards the content. A poorly designed camera system in a game can disrupt a users experience, while a well-designed one can make a good game into a great one. Breaks down the algorithms behind contemporary game camera systems, written by a leading expert in the area.The Rise of the Intelligent Health System (Intelligent Health Series)
Par Paul H. Frisch, Harry P. Pappas. 2024
"I recommend that all members of the health community read this book to obtain a real snapshot of how the…
Intelligent Health System is being transformed via new technologies." Chris Landon MD FAAP, FCCP, FRSM Clinical Associate Professor USC Keck School of Medicine Technology Development Center Laboratory and Studio The "Intelligent Health Pavilion" as demonstrated at the annual HIMSS Conference by the Intelligent Health Association is the impetus for this book. This book documents the remarkable journey of "Intelligent Health System" and the adoption of Innovative technologies. Many showcased in real time on the trade show floor and now in this book: "The Rise of the Intelligent Health System". In each chapter of this book, authors are expressing the immense potential of merging cutting-edge technology with the complex realm of patient care and safety. The informative chapters in this book delve deep into the unfolding story of how hospitals have evolved into interactive, intelligent environments, driven by real-time data and powered by artificial intelligence. In what seems like the blink of an eye, technology has completely transformed the way we live, work, and interact with the world around us. From smartphones to self-driving cars, ChatGPT, wireless technologies, wearables, and many other innovations are reshaping our society, pushing the boundaries of what was once considered impossible. However, nowhere is the impact of technology more profound than in the field of healthcare.Image Processing and Machine Learning, Volume 1: Foundations of Image Processing
Par Erik Cuevas, Alma Nayeli Rodríguez. 2024
Image processing and machine learning are used in conjunction to analyze and understand images. Where image processing is used to…
pre-process images using techniques such as filtering, segmentation, and feature extraction, machine learning algorithms are used to interpret the processed data through classification, clustering, and object detection. This book serves as a textbook for students and instructors of image processing, covering the theoretical foundations and practical applications of some of the most prevalent image processing methods and approaches. Divided into two volumes, this first installment explores the fundamental concepts and techniques in image processing, starting with pixel operations and their properties and exploring spatial filtering, edge detection, image segmentation, corner detection, and geometric transformations. It provides a solid foundation for readers interested in understanding the core principles and practical applications of image processing, establishing the essential groundwork necessary for further explorations covered in Volume 2. Written with instructors and students of image processing in mind, this book’s intuitive organization also contains appeal for app developers and engineers.Image Processing and Machine Learning, Volume 2: Advanced Topics in Image Analysis and Machine Learning
Par Erik Cuevas, Alma Nayeli Rodríguez. 2024
Image processing and machine learning are used in conjunction to analyze and understand images. Where image processing is used to…
pre-process images using techniques such as filtering, segmentation, and feature extraction, machine learning algorithms are used to interpret the processed data through classification, clustering, and object detection. This book serves as a textbook for students and instructors of image processing, covering the theoretical foundations and practical applications of some of the most prevalent image processing methods and approaches. Divided into two volumes, this second installment explores the more advanced concepts and techniques in image processing, including morphological filters, color image processing, image matching, feature-based segmentation utilizing the mean shift algorithm, and the application of singular value decomposition for image compression. This second volume also incorporates several important machine learning techniques applied to image processing, building on the foundational knowledge introduced in Volume 1. Written with instructors and students of image processing in mind, this book’s intuitive organization also contains appeal for app developers and engineers.Cellular Automata and Groups (Springer Monographs in Mathematics)
Par Tullio Ceccherini-Silberstein, Michel Coornaert. 2023
This unique book provides a self-contained exposition of the theory of cellular automata on groups and explores its deep connections…
with recent developments in geometric and combinatorial group theory, amenability, symbolic dynamics, the algebraic theory of group rings, and other branches of mathematics and theoretical computer science. The topics treated include the Garden of Eden theorem for amenable groups, the Gromov–Weiss surjunctivity theorem, and the solution of the Kaplansky conjecture on the stable finiteness of group rings for sofic groups. Entirely self-contained and now in its second edition, the volume includes 10 appendices and more than 600 exercises, the solutions of which are presented in the companion book Exercises in Cellular Automata and Groups (2023) by the same authors. It will appeal to a large audience, including specialists and newcomers to the field.Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, December 6-8, 2018, Volume 1 (Advances in Intelligent Systems and Computing #940)
Par Ajith Abraham, Aswani Kumar Cherukuri, Patricia Melin, Niketa Gandhi. 2020
This book highlights recent research on Intelligent Systems and Nature Inspired Computing. It presents 212 selected papers from the 18th…
International Conference on Intelligent Systems Design and Applications (ISDA 2018) and the 10th World Congress on Nature and Biologically Inspired Computing (NaBIC), which was held at VIT University, India. ISDA-NaBIC 2018 was a premier conference in the field of Computational Intelligence and brought together researchers, engineers and practitioners whose work involved intelligent systems and their applications in industry and the “real world.” Including contributions by authors from over 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.