Résultats de recherche de titre
Articles 1 à 20 sur 3592
Kid Olympians: True Tales of Childhood from Champions and Game Changers (Kid Legends #9)
Par Robin Stevenson. 2024
Triumphant, relatable, and totally true biographies tell the childhood stories of a diverse group of international athletes who have captured…
the world’s attention at the Summer Olympics and Paralympics, like Simone Biles, Jesse Owens, Naomi Osaka, Tatyana McFadden, and 12 other incredible olympians.Athletes throughout history have dreamed of competing in the Olympics—and some were kids themselves when those dreams and plans began! In Kid Olympians: Summer, discover the childhood stories of legends such as: Usain Bolt, who used to skip practices to go to the arcade and play video games.Serena Williams, who sometimes hit her tennis ball over the fence on purpose!Tatyana McFadden, who had to fight to be allowed on her school’s track teamFeaturing kid-friendly text and full-color illustrations, you’ll be inspired to dream bigger, faster, and higher than ever before! The diverse and inspiring group also includes Michael Phelps, Yusra Mardini, Dick Fosbury, Ibtihaj Muhammad, Gertrude Ederle, Nadia Comaneci, Ellie Simmonds, Tommie Smith, Wilma Rudolph, and Megan Rapinoe.Pride and Persistence: Stories of Queer Activism (Do You Know My Name? #4)
Par Mary Fairhurst Breen. 2023
The activists between these pages have stood up for the queer community, whether on their own behalf or in support…
of people they love. Some made a difference by confronting injustice; others dared to be fully themselves.See It, Dream It, Do It: How 25 people just like you found their dream jobs
Par Colleen Nelson, Kathie MacIsaac. 2023
From award-winning author Colleen Nelson, and literacy advocate Kathie MacIsaac, twenty-five profiles present a plethora of jobs, and people, making…
it easier than ever for young people to see their dreams and to live their dreams!Beryl: The Making of a Disability Activist
Par Dustin Galer. 2023
The story of a mid-century working-class housewife whose extraordinary physical transformation empowered her to become a dynamic social activist who…
fueled a movement to create a more inclusive future for people with disabilities.Über den Apple Store kann man zurzeit Millionen mobiler Anwendungen herunterladen. Die Einsatzmöglichkeiten sind vielfältig und die Bandbreite der Anwendungsszenarien bewegt sich…
von komplexen Computerspielen bis hin zu Geschäftsanwendungen. In den vergangenen Jahren wurden unterschiedliche Entwicklungsparadigmen bereitgestellt, die hinsichtlich verschiedener Aspekte wie zum Beispiel Plattformunabhängigkeit, Performanz, Kosten sowie dem Zugriff auf gerätespezifische, native Funktionen sowohl Vor- als auch Nachteile besitzen. Die Kapitel gehen didaktisch in die Breite und stellen die Entwicklungsparadigmen vor dem Hintergrund einer zentralen Fallstudie gegenüber. Es werden Techniken zur Entwicklung von mobilen Webanwendungen, hybriden Anwendungen, nativen Anwendungen für Android sowie Cross-Plattform-Anwendungen vorgestellt, ohne innerhalb eines Paradigmas zu sehr in die Tiefe zu gehen. Eine Ausnahme bildet das von Google bereitgestellte Flutter-Framework, das sowohl die Entwicklung auf Android- als auch iOS-Geräten unterstützt.Dieses Lehrbuch richtet sich an Studentinnen und Studenten, die bereits mit einer objektorientierten Programmiersprache vertraut sind und wesentliche Aspekte der Programmierung kennen und einen Einblick in das Mobile Computing erlangen möchten.Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science #14412)
Par Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran. 2024
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023,…
held in Roorkee, India, in December 2023.The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.Computer Supported Cooperative Work and Social Computing: 18th CCF Conference, ChineseCSCW 2023, Harbin, China, August 18–20, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2013)
Par Yuqing Sun, Tun Lu, Tong Wang, Hongfei Fan, Dongning Liu, Bowen Du. 2024
This two-volume set constitutes the revised selected papers of the 18th CCF Conference on Computer Supported Cooperative Work and Social…
Computing, ChineseCSCW 2023 held in Harbin, China, in August 2023. The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.This book constitutes the refereed post-conference proceedings of the 18th EAI International Conference on Tools for Design, Implementation and Verification…
of Emerging Information Technologies, TridentCom 2023, which was held in Nanjing, China, during November 11-13, 2023. The 9 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on blockchain and its applications; emerging applications; AI and its security.Computer Supported Cooperative Work and Social Computing: 18th CCF Conference, ChineseCSCW 2023, Harbin, China, August 18–20, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2012)
Par Yuqing Sun, Tun Lu, Tong Wang, Hongfei Fan, Dongning Liu, Bowen Du. 2024
This two-volume set constitutes the revised selected papers of the 18th CCF Conference on Computer Supported Cooperative Work and Social…
Computing, ChineseCSCW 2023 held in Harbin, China, in August 2023. The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.Multidimensional Signals, Augmented Reality and Information Technologies: Proceedings of 3DWCAI 2023 (Smart Innovation, Systems and Technologies #374)
Par Roumen Kountchev, Srikanta Patnaik, Wenfeng Wang, Roumiana Kountcheva. 2024
This book features a collection of high-quality, peer-reviewed research papers presented at Second 'World Conference on Intelligent and 3-D Technologies'…
(WCI3DT 2023), held in China during May 26–28, 2023. The book provides an opportunity to researchers and academia as well as practitioners from industry to publish their ideas and recent research development work on all aspects of 3D imaging technologies and artificial intelligence, their applications and other related areas. The book presents ideas and the works of scientists, engineers, educators and students from all over the world from institutions and industries.Blockchain in Healthcare: Analysis, Design and Implementation (Future of Business and Finance)
Par Chang Lu, Mohan Tanniru. 2023
This books brings readers a holistic understanding of blockchain adoption in healthcare by not only considering the technical fundamentals of…
use cases, but also the regulatory, informational and organizational challenges and solutions. The book also provides frameworks and toolkits to manage the entire life cycle of adoption, including analysing the environment and feasibility, application design from a user-centred perspective, and implementation strategies that would overcome organizational and informational barriers. Specific issues addressed include but are not limited to: How to analyse the value propositions in healthcare and which distributed actors should be engaged to fulfil these propositions? What policies and practices need to be reviewed to ensure security and privacy of the information shared? How to design blockchain systems that seamlessly integrate with other stakeholder applications, while only the needed information is in the distributed architecture? How can blockchain implementation be managed from governance and risk mitigation perspectives, especially when multiple actors are involved?By reading this book, blockchain enthusiasts, health informatics professionals and healthcare executives will be better prepared to leverage the transformative potential of blockchain for healthcare.Algorithms and Discrete Applied Mathematics: 10th International Conference, CALDAM 2024, Bhilai, India, February 15–17, 2024, Proceedings (Lecture Notes in Computer Science #14508)
Par Subrahmanyam Kalyanasundaram, Anil Maheshwari. 2024
This book constitutes the refereed proceedings of the 10th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2024, held in…
Bhilai, India during February 15–17, 2024. The 22 full papers included in this book were carefully reviewed and selected from 57 submissions. They were organized in topical sections as follows: Algorithms and Complexity; Computational Geometry; Discrete Applied Mathematics; Graph Algorithms; Graph Theory.Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021 (Lecture Notes on Data Engineering and Communications Technologies #68)
Par Subarna Shakya, Robert Bestak, Ram Palanisamy, Khaled A. Kamel. 2022
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2021) organized…
by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 29–30 January 2021. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.WordPress All-in-One For Dummies
Par Lisa Sabin-Wilson. 2024
The no-nonsense guide to building your own WordPress site With the help of WordPress All-in-One For Dummies, you can get…
your first WordPress blog or website set up in no time. Fully updated for the latest WordPress releases, this 8-books-in-1 guide walks you through all the features of this powerful web builder. You’ll discover how to choose and customize a theme, pick the perfect web host and URL, and manage multiple websites with multiple authors. Use WordPress as a content management software (CMS) platform, work with multimedia formats, and add plugins to your site. With state-of-the-art features, WordPress has become the go-to platform for website owners and bloggers who want to be noticed. This beginner-friendly Dummies guide gives you the know-how to make WordPress work for you. Build a website or blog with WordPress, the leading open-source web builder Discover the powerful, customizable features of the latest versions of WordPress Allow multiple people to contribute to your site and keep your content organized Easily make changes and modifications with the WordPress interface Both WordPress novices and more experienced users looking to dive into new features will love the easy-to-follow instructions and tips in WordPress All-in-One For Dummies.Coming Out as Dalit: A Memoir of Surviving India's Caste System
Par Yashica Dutt. 2024
&“…a moving personal story and a useful educational examination of persistent discrimination&”—Kirkus ReviewsFor readers of Caste, the coming-of-age story of…
a Dalit individual that illuminates systemic injustice in India and its growing impact on US society Winner of the Sahitya Akademi Yuva Puruskar, 2020Born into a "formerly untouchable manual-scavenging family in small-town India," Yashica Dutt was taught from a young age to not appear &“Dalit looking.&” Although prejudice against Dalits, who compose 25% of the population, has been illegal since 1950, caste-ism in India is alive and well. Blending her personal history with extensive research and reporting, Dutt provides an incriminating analysis of caste&’s influence in India over everything from entertainment to judicial systems and how this discrimination has carried over to US institutions.Dutt traces how colonial British forces exploited and perpetuated a centuries old caste system, how Gandhi could have been more forceful in combatting prejudice, and the role played by Dr. B. R. Ambedkar, whom Isabel Wilkerson called &“the MLK of India&’s caste issues&” in her book Caste. Alongside her analysis, Dutt interweaves personal stories of learning to speak without a regional accent growing up and desperately using medicinal packs to try to lighten her skin.Published in India in 2019 to acclaim, this expanded edition includes two new chapters covering how the caste system traveled to the US, its history here, and the continuation of bias by South Asian communities in professional sectors. Amid growing conversations about caste discrimination prompting US institutions including Harvard University, Brandeis University, the University of California system, and the NAACP to add caste as a protected category to their policies, Dutt&’s work sheds essential light on the significant influence caste-ism has across many aspects of US society.Raw and affecting, Coming Out as Dalit brings a new audience of readers into a crucial conversation about embracing Dalit identity, offering a way to change the way people think about caste in their own communities and beyond.In his bestselling first book, Eric Siegel explained how machine learning works. Now, in The AI Playbook, he shows how…
to capitalize on it.&“Eric Siegel delivers a robust primer on machine learning, the key mechanism in AI. A forward-looking, practical book and a must-read for anyone in the information economy.&” —Scott Galloway, NYU Stern Professor of Marketing; bestselling author of The Four &“An antidote to today&’s relentless AI hype—why some AI initiatives thrive while others fail and what it takes for companies and people to succeed.&”—Charles Duhigg, author of bestsellers The Power of Habit and Smarter Faster BetterThe greatest tool is the hardest to use. Machine learning is the world&’s most important general-purpose technology—but it&’s notoriously difficult to launch. Outside Big Tech and a handful of other leading companies, machine learning initiatives routinely fail to deploy, never realizing value. What&’s missing? A specialized business practice suitable for wide adoption. In The AI Playbook, bestselling author Eric Siegel presents the gold-standard, six-step practice for ushering machine learning projects from conception to deployment. He illustrates the practice with stories of success and of failure, including revealing case studies from UPS, FICO, and prominent dot-coms. This disciplined approach serves both sides: It empowers business professionals, and it establishes a sorely needed strategic framework for data professionals. Beyond detailing the practice, this book also upskills business professionals—painlessly. It delivers a vital yet friendly dose of semi-technical background knowledge that all stakeholders need to lead or participate in machine learning projects, end to end. This puts business and data professionals on the same page so that they can collaborate deeply, jointly establishing precisely what machine learning is called upon to predict, how well it predicts, and how its predictions are acted upon to improve operations. These essentials make or break each initiative—getting them right paves the way for machine learning&’s value-driven deployment.What kind of AI does this book cover? The buzzword AI can mean many things, but this book is about machine learning, which is a central basis for—and what many mean by—AI. To be specific, this book covers the most vital use cases of machine learning, those designed to improve a wide range of business operations.An Introduction to Cyberpsychology (BPS Core Textbooks Series)
Par Gráinne Kirwan, Irene Connolly, Hannah Barton, and Marion Palmer. 2024
An Introduction to Cyberpsychology provides a comprehensive introduction to this rapidly growing discipline. Fully updated in its second edition, the…
book encourages students to critically evaluate the psychology of online interactions and to develop appropriate research methodologies to complete their own work in this field.The book examines cyberpsychology and online research methodologies, social psychology in an online context, practical applications of cyberpsychology, and the psychological aspects of other technologies. This new edition has been carefully updated to include additional coverage of: Expanded content relating to major developments in the field and new content on gaming and screentime A new chapter examining the relationship between older adults and technology Cyberpsychology in focus feature boxes in each chapter that examine topics in depth Interviews with professionals working in fields relating to cyberpsychology Each chapter includes key terms and a glossary, content summaries, discussion questions, and recommended reading to guide further study.Supported by extensive online resources for students and instructors, this authoritative book is an essential core text for undergraduate modules in cyberpsychology, and an ideal primer for students of postgraduate programs in cyberpsychology.To view the additional student and instructor resources for this book, please visit bpscoretextbooks.routledge.comAzure Security
Par Bojan Magusic. 2024
Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy…
to keep your data safe.As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you&’ll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the book Azure Security details best practices for configuring and deploying Azure&’s native security services—from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you&’ve learned. What's inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the reader For software and security engineers building and securing Azure applications. About the author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Table of Contents PART 1 FIRST STEPS 1 About Azure security 2 Securing identities in Azure: The four pillars of identity and Azure Active Directory PART 2 SECURING AZURE RESOURCES 3 Implementing network security in Azure: Firewall, WAF, and DDoS protection 4 Securing compute resources in Azure: Azure Bastion, Kubernetes, and Azure App Service 5 Securing data in Azure Storage accounts: Azure Key Vault 6 Implementing good security hygiene: Microsoft Defender for Cloud and Defender CSPM 7 Security monitoring for Azure resources: Microsoft Defender for Cloud plans PART 3 GOING FURTHER 8 Security operations and response: Microsoft Sentinel 9 Audit and log data: Azure Monitor 10 Importance of governance: Azure Policy and Azure Blueprints 11 DevSecOps: Microsoft Defender for DevOpsIntermediate C Programming
Par Yung-Hsiang Lu, George K. Thiruvathukal. 2024
Revised for a new second edition, Intermediate C Programming provides a stepping-stone for intermediate-level students to go from writing short…
programs to writing real programs well. It shows students how to identify and eliminate bugs, write clean code, share code with others, and use standard Linux-based tools, such as ddd and valgrind. This second edition provides expanded coverage of these topics with new material focused on software engineering, including version control and unit testing. The text enhances their programming skills by explaining programming concepts and comparing common mistakes with correct programs. It also discusses how to use debuggers and the strategies for debugging as well as studies the connection between programming and discrete mathematics. Including additional student and instructor resources available online, this book is particularly appealing as a classroom resource.Dashboard Design (River Publishers Series in Computing and Information Science and Technology)
Par Michael Burch, Marco Schmid. 2023
Interactive visualization and visual analytics tools have been designed and developed in the past and will be developed in the…
future as well. In each application domain in which data is measured, generated, and recorded we see a potential candidate for an interactive visualization tool with the goal to find insights and knowledge in the data. This knowledge can be found either visually by humans’ interventions or algorithmically by the machine, in the best case by applying both concepts in combination as in visual analytics. One of the easiest ways to get an interactive visualization tool running is by means of dashboards, typically implemented as webpages that can run in a web browser and are accessible online, creating some kind of web-based solution. This book describes ways to design and implement dashboards based on the programming language Python, the graphics library Plotly, and Dash. The readers can use the provided dashboard codes as a starting point and extend the functionality and features on their desire. Technical topics discussed in the book include: Design in visualization Interaction principles in information visualization User interface design Linking Python, Dash, and Plotly Coding in Python Dashboard examples with Python code.