Résultats de recherche de titre
Articles 1 à 20 sur 2963
Comprendre l'intelligence artificielle (L'Encyclopédie d'Utovie)
Par Louis Belon. 2023
Un ouvrage pour faire toute la lumière sur l'intelligence artificielle qui, selon l'auteur, ne constitue pas un mal en soi…
mais qui nécessite de s'interroger sur celles et ceux qui sont à l'origine de cet outil.Colditz: la forteresse d'Hitler (Histoire)
Par Ben Macintyre. 2023
L'histoire de ce château gothique transformé en prison, dans lequel environ 200 officiers alliés capturés par les nazis ont passé…
la Seconde Guerre mondiale à préparer des évasions malgré la surveillance de leurs geôliers. Dans cette enceinte ultrasécurisée, les alliances secrètes, les trahisons et les projets rocambolesques se succèdent jusqu'à la fin du conflit.Une jeunesse sous l'Occupation (Document)
Par Alice Mendelson. 2023
Juive d'origine polonaise ayant grandi dans le 18e arrondissement de Paris, Alice Mendelson raconte ses souvenirs de la Seconde Guerre…
mondiale, de la déportation de son père en septembre 1941 au combat pour obtenir justice, après la Libération. Alice, 16 ans, et ses parents sont dénoncés par des voisins, elle et sa mère échappent à la rafle du Vél'd'Hiv et s'engagent dans la Résistance.The counterfeit countess: The jewish woman who rescued thousands of poles during the holocaust
Par Elizabeth B White. 2024
The astonishing story of Dr. Josephine Janina Mehlberg—a Jewish mathematician who saved thousands of lives in Nazi-occupied Poland by masquerading…
as a Polish aristocrat—drawing on Mehlberg's own unpublished memoir. World War II and the Holocaust have given rise to many stories of resistance and rescue, but The Counterfeit Countess is unique. It tells the remarkable, unknown story of "Countess Janina Suchodolska," a Jewish woman who rescued more than 10,000 Poles imprisoned by Poland's Nazi occupiers. Mehlberg operated in Lublin, Poland, headquarters of Aktion Reinhard, the SS operation that murdered 1.7 million Jews in occupied Poland. Using the identity papers of a Polish aristocrat, she worked as a welfare official while also serving in the Polish resistance. With guile, cajolery, and steely persistence, the "Countess" persuaded SS officials to release thousands of Poles from the Majdanek concentration camp. She won permission to deliver food and medicine—even decorated Christmas trees—for thousands more of the camp's prisoners. At the same time, she personally smuggled supplies and messages to resistance fighters imprisoned at Majdanek, where 63,000 Jews were murdered in gas chambers and shooting pits. Incredibly, she eluded detection, and ultimately survived the war and emigrated to the US. Drawing on the manuscript of Mehlberg's own unpublished memoir, supplemented with prodigious research, Elizabeth White and Joanna Sliwa, professional historians and Holocaust experts, have uncovered the full story of this remarkable woman. They interweave Mehlberg's sometimes harrowing personal testimony with broader historical narrative. Like The Light of Days , Schindler's List , and Irena's Children , The Counterfeit Countess is an unforgettable account of inspiring courage in the face of unspeakable crueltyLovers in auschwitz: A true story
Par Keren Blankfeld. 2024
"Mesmerizing and inspirational."—Judy Batalion, New York Times bestselling author of The Light of Days The incredible true story of two…
Holocaust survivors who fell in love in Auschwitz, only to be separated upon liberation and lead remarkable lives apart following the war—and then find each other again more than 70 years later. Zippi Spitzer and David Wisnia were captivated by each other from the moment they first exchanged glances across the work floor. It was the beginning of a love story that could have happened anywhere. Except for one difference: this romance was unfolding in history's most notorious death camp, between two young prisoners whose budding intimacy risked dooming them if they were caught. Incredibly, David and Zippi survived for years beneath the ash-choked skies of Auschwitz. Under the protection of their fellow inmates, their romance grew and deepened, even as their brushes with death mounted and David's luck in particular seemed close to running out. As the war's end finally approached and the time came for them to leave the camp, David and Zippi made plans to meet again. But neither of them could imagine how long their reunion would take or how many lives they would live in the interim. They had no inkling, either, of the betrayals that would await them along the way. But David did suspect that Zippi harbored a secret—one that could explain the mystery of his survival all those years ago. An unbelievable tale of romance, sacrifice, loss, and resilience, Lovers in Auschwitz is a saga of two young people who found themselves trapped inside a waking nightmare of the Nazis' creation, yet who nevertheless discovered a love that sustained them through history's darkest hourBeverly hills spy: The double-agent war hero who helped japan attack pearl harbor
Par Ronald Drabkin. 2024
In the spirit of Ben Macintyre's greatest spy nonfiction, the truly unbelievable and untold story of Frederick Rutland—a debonair British…
WWI hero, flying ace, fixture of Los Angeles society, and friend of Golden Age Hollywood stars—who flipped to become a spy for Japan in the lead-up to the attack on Pearl Harbor. Frederick Rutland was an accomplished aviator, British WWI war hero, and real-life James Bond. He was the first pilot to take off and land a plane on a ship, a decorated warrior for his feats of bravery and rescue, was trusted by the admirals of the Royal Navy, had a succession of aeronautical inventions, and designed the first modern aircraft carrier. He was perhaps the most famous early twentieth-century naval aviator. Despite all of this, and due mostly to class politics, Rutland was not promoted in the new Royal Air Force in the wake of WWI. This ignominy led the disgruntled Rutland to become a spy for the Japanese navy. Plied with riches and given a salary ten times the highest-paid admiral, shuttled between Los Angeles and Tokyo where he lived in large mansions in both Beverly Hills and Yokohama, and insinuating himself into both LA high society and Japan's high command, Rutland would go on to contribute to the Japanese navy with both strategic and technical intelligence. This included scouting trips to Pearl Harbor, investigations of military preparedness, and aircraft technology. All this while living a double life, frequenting private California clubs and hosting lavish affairs for Hollywood stars and military dignitaries in his mansion on the Los Angeles Bird Streets. Supported by recently declassified FBI files and by incorporating unique and rare research through MI5 and Japanese Naval archives that few English speakers have access to, author Ronald Drabkin pieces together to completion, for the first time, this stranger-than-fiction story of one of the most fascinating and enigmatic characters of espionage history. Supplemental enhancement PDF accompanies the audiobookBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseGrossly unsanitary living conditions, cruel and abusive treatment by camp officials, the withholding of medical treatment - these were common…
experiences for refugees imprisoned at internment camps in Britain and Canada. Walter Igersheimer's memoir exposes this bleak period in the British and Canadian war record.NGINX Cookbook
Par Derek DeJonghe. 2024
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load…
balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source or commercial offering to solve problems in various use cases.For professionals who understand modern web architectures, such as n-tier or microservice designs and common web protocols such as TCP and HTTP, these recipes provide proven solutions for security and software load balancing and for monitoring and maintaining NGINX's application delivery platform. You'll also explore advanced features of both NGINX and NGINX Plus, the free and licensed versions of this server.You'll find recipes for:High-performance load balancing with HTTP, TCP, and UDPSecuring access through encrypted traffic, secure links, HTTP authentication subrequests, and moreDeploying NGINX to Google, AWS, and Azure cloudSetting up and configuring NGINX ControllerInstalling and configuring the NGINX App Protect moduleEnabling WAF through Controller ADCNGINX Instance Manager, Service Mesh, and the njs moduleLaws of UX: Using Psychology To Design Better Products And Services
Par Jon Yablonski. 2024
An understanding of psychology-specifically the psychology behind how users behave and interact with digital interfaces-is perhaps the single most valuable…
nondesign skill a designer can have. The most elegant design can fail if it forces users to conform to the design instead of working within the "blueprint" of how humans perceive and process the world around them.This practical guide explains how you can apply key principles of psychology to build products and experiences that are more human-centered and intuitive. Author Jon Yablonski deconstructs familiar apps and experiences to provide clear examples of how UX designers can build interfaces that adapt to how users perceive and process digital interfaces.You'll learn:How aesthetically pleasing design creates positive responsesThe principles of psychology most useful for designersHow these psychology principles relate to UX heuristicsPredictive models including Fitts's law, Jakob's law, and Hick's lawEthical implications of using psychology in designA practical framework for applying principles of psychology in your design processThis updated edition includes an even deeper connection to the underlying psychological concepts that govern the principles explored in the book, along with accompanying UX methods and techniques. Examples have been updated to ensure the deconstructed apps and experiences remain familiar and relevant.Linked: Conquer LinkedIn. Get Your Dream Job. Own Your Future.
Par Omar Garriott, Jeremy Schifeling. 2022
The LinkedIn insider&’s guide to how the new job search really works—and how to make it work for you. No…
one disputes that LinkedIn is the world&’s biggest job market. So it&’s about time that someone with the inside scoop explained how to make the most of it. Here, from two LinkedIn experts and former employees, is the definitive guide that demystifies the massive site and gives every reader—from the newly minted college graduate to the midlife career-changer—the most important strategies to win the modern job search game. Clear, lively, and decidedly practical, Linked shows how to burnish your personal brand so recruiters come to you. Tap the power of the network effect and turn anyone into an invaluable referral. Think like employers and focus your profile to get noticed, get considered, and get hired. And game both the search algorithm and Applicant Tracking Systems used by nearly every employer in every economic sector. The result: not just a great job, but the future of your dreams.Sisters in Resistance: How a German Spy, a Banker's Wife, and Mussolini's Daughter Outwitted the Nazis
Par Tilar J. Mazzeo. 2022
In a tale as twisted as any spy thriller, discover how three women delivered critical evidence of Axis war crimes…
to Allied forces during World War II: &“A tantalizingly novelistic history lesson" (Kirkus). In 1944, news of secret diaries kept by Italy's Foreign Minister, Galeazzo Ciano, had permeated public consciousness. What wasn't reported, however, was how three women—a Fascist's daughter, a German spy, and an American banker&’s wife—risked their lives to ensure the diaries would reach the Allies, who would later use them as evidence against the Nazis at Nuremberg. In 1944, Benito Mussolini's daughter, Edda, gave Hitler and her father an ultimatum: release her husband, Galeazzo Ciano, from prison, or risk her leaking her husband's journals to the press. To avoid the peril of exposing Nazi lies, Hitler and Mussolini hunted for the diaries for months, determined to destroy them. Hilde Beetz, a German spy, was deployed to seduce Ciano to learn the diaries' location and take them from Edda. As the seducer became the seduced, Hilde converted as a double agent, joining forces with Edda to save Ciano from execution. When this failed, Edda fled to Switzerland with Hilde&’s daring assistance to keep Ciano's final wish: to see the diaries published for use by the Allies. When American spymaster Allen Dulles learned of Edda's escape, he sent in Frances De Chollet, an &“accidental&” spy, telling her to find Edda, gain her trust, and, crucially, hand the diaries over to the Americans. Together, they succeeded in preserving one of the most important documents of WWII. Drawing from in‑depth research and first-person interviews with people who witnessed these events, Mazzeo gives readers a riveting look into this little‑known moment in history and shows how, without Edda, Hilde, and Frances's involvement, certain convictions at Nuremberg would never have been possible.Includes a Reading Group Guide.Distributed Machine Learning Patterns
Par Yuan Tang. 2024
Practical patterns for scaling machine learning from your laptop to a distributed cluster.Distributing machine learning systems allow developers to handle…
extremely large datasets across multiple clusters, take advantage of automation tools, and benefit from hardware accelerations. This book reveals best practice techniques and insider tips for tackling the challenges of scaling machine learning systems. In Distributed Machine Learning Patterns you will learn how to: Apply distributed systems patterns to build scalable and reliable machine learning projects Build ML pipelines with data ingestion, distributed training, model serving, and more Automate ML tasks with Kubernetes, TensorFlow, Kubeflow, and Argo Workflows Make trade-offs between different patterns and approaches Manage and monitor machine learning workloads at scale Inside Distributed Machine Learning Patterns you&’ll learn to apply established distributed systems patterns to machine learning projects—plus explore cutting-edge new patterns created specifically for machine learning. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Hands-on projects and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines. About the technology Deploying a machine learning application on a modern distributed system puts the spotlight on reliability, performance, security, and other operational concerns. In this in-depth guide, Yuan Tang, project lead of Argo and Kubeflow, shares patterns, examples, and hard-won insights on taking an ML model from a single device to a distributed cluster. About the book Distributed Machine Learning Patterns provides dozens of techniques for designing and deploying distributed machine learning systems. In it, you&’ll learn patterns for distributed model training, managing unexpected failures, and dynamic model serving. You&’ll appreciate the practical examples that accompany each pattern along with a full-scale project that implements distributed model training and inference with autoscaling on Kubernetes. What's inside Data ingestion, distributed training, model serving, and more Automating Kubernetes and TensorFlow with Kubeflow and Argo Workflows Manage and monitor workloads at scale About the reader For data analysts and engineers familiar with the basics of machine learning, Bash, Python, and Docker. About the author Yuan Tang is a project lead of Argo and Kubeflow, maintainer of TensorFlow and XGBoost, and author of numerous open source projects. Table of Contents PART 1 BASIC CONCEPTS AND BACKGROUND 1 Introduction to distributed machine learning systems PART 2 PATTERNS OF DISTRIBUTED MACHINE LEARNING SYSTEMS 2 Data ingestion patterns 3 Distributed training patterns 4 Model serving patterns 5 Workflow patterns 6 Operation patterns PART 3 BUILDING A DISTRIBUTED MACHINE LEARNING WORKFLOW 7 Project overview and system architecture 8 Overview of relevant technologies 9 A complete implementationInternet of Production: Fundamentals, Methods and Applications (Interdisciplinary Excellence Accelerator Series)
Par Christian Brecher, Günther Schuh, Wil van der Aalst, Matthias Jarke, Frank T. Piller, Melanie Padberg. 2024
This seminal compendium, available through open access, illuminates the forefront of digital collaboration in production. It introduces the visionary concept…
of the Internet of Production (IoP), an ambitious initiative by Germany's esteemed Cluster of Excellence at RWTH Aachen University. This handbook pioneers the integration of data, models, and knowledge across development, production, and user cycles, offering interdisciplinary insights into production technology's horizons with the overall objective to create a worldwide lab.The work is organized into seven key parts, each contributing to a comprehensive understanding of the IoP. Part I lays the foundation with interdisciplinary visions and concepts. Part II delves into IoP's infrastructure, encompassing digital shadows and actionable artificial intelligence. Part III examines materials within the digitalized production landscape. Part IV confronts the challenges and potentials of production processes under novel digitalization methods.Part V focuses on production management with data-driven decision support, while Part VI explores agile development processes. Finally, Part VII delves into the interplay between internal and external perspectives in the IoP, human-centered work design, and platform-based ecosystems.Supported by the German Research Foundation (DFG), this compendium redefines manufacturing through the transformative IoP lens. Embrace this scholarly endeavor to embrace technological advancement. This is an open access book.Learn Concurrent Programming with Go
Par James Cutajar. 2024
Concurrency doesn&’t need to be confusing. Start writing concurrent code that improves performance, scales up to handle large volumes of…
data, and takes full advantage of modern multi-processor hardware.Too many developers think concurrency is extremely challenging. Learn Concurrent Programming with Go is here to prove them wrong! This book uses the easy-to-grasp concurrency tools of the Go language to demonstrate principles and techniques, steadily teaching you the best practices of effective concurrency. Techniques learned in this book can be applied to other languages. In Learn Concurrent Programming with Go you will learn how to: Implement effective concurrency for more responsive, higher performing, scalable software Avoid common concurrency problems such as deadlocks and race conditions Manage concurrency using goroutines, mutexes, readers-writer locks, and more Identify concurrency patterns such as pipelining, worker pools, and message passing Discover advantages, limits, and properties of parallel computing Improve your Go coding skills with advanced multithreading topics Concurrent programming allows multiple tasks to execute and interact simultaneously, speeding up performance and reducing user wait time. In Learn Concurrent Programming with Go, you&’ll discover universal principles of concurrency, along with how to use them for a performance boost in your Go applications. Expert author James Cutajar starts with the basics of modeling concurrency in your programs, demonstrates differences between message passing and memory sharing, and even introduces advanced topics such as atomic variables and futexes. About the technology You can improve almost any application&’s performance and responsiveness by introducing concurrency into the codebase. This book will show you how! It starts with the basics of concurrent programming and builds your skills step by step by exploring scenarios you&’ll face every day as a developer. Author James Cutajar explains each aspect of concurrency in plain language using the intuitive features baked into the Go language. About the book Learn Concurrent Programming with Go provides a practical, hands-on introduction to creating software for modern multiprocessor systems. In it, you&’ll learn how to divide larger programming tasks into independent parts that can run simultaneously. You&’ll use the Go language to implement common concurrency patterns by utilizing readers-writer locks, semaphores, message passing, and memory sharing. The skills you learn will easily transfer to other languages. What's inside Prevent deadlocks and race conditions Go concurrency features like goroutines, mutexes, channels, and more Concurrency patterns including pipelining and worker pools About the reader For programmers with basic knowledge of Go or another C-style language. No experience in concurrent programming required. About the author James Cutajar has been programming for more than 20 years. He&’s an open source contributor, blogger, tech evangelist, Udemy instructor, and author. Table of Contents PART 1 FOUNDATIONS 1 Stepping into concurrent programming 2 Dealing with threads 3 Thread communication using memory sharing 4 Synchronization with mutexes 5 Condition variables and semaphores 6 Synchronizing with waitgroups and barriers PART 2 MESSAGE PASSING 7 Communication using message passing 8 Selecting channels 9 Programming with channels PART 3 MORE CONCURRENCY 10 Concurrency patterns 11 Avoiding deadlocks 12 Atomics, spin locks, and futexesLineare Kirchhoff-Netzwerke: Grundlagen, Analyse und Synthese
Par Reiner Thiele. 2023
Das Buch vermittelt ausgehend von den Grundlagen der Netzwerk-Theorie neuartige Analyse- und Syntheseverfahren für lineare zeitinvariante Kirchhoff-Netzwerke. Hierzu verwendet der…
Autor als Elementarnetzwerke gewöhnliche Widerstände, Kondensatoren und Spulen sowie die sogenannten pathologischen Unternetzwerke Nullator, Norator und Nullor. Der Nullor besteht dabei aus einem Nullator und einem Norator, wird hinsichtlich seines Klemmenverhaltens durch die Belevitch-Darstellung beschrieben und näherungsweise durch einen Operationsverstärker realisiert. Zur Analyse oder Synthese erfolgt die Zerlegung in realisierbare Unternetzwerke mit dem Verfahren der Singulärwert-Zerlegung von Matrizen. Außerdem zeigt Reiner Thiele, wie durch die Applikation von Klemmen-Äquivalenzen praxisrelevante elektrische oder elektronische Schaltungen entstehen.Entrepreneurship der Zukunft: Voraussetzung, Implementierung und Anwendung von Künstlicher Intelligenz im Rahmen datenbasierter Geschäftsmodelle
Par Lars Heim, Sebastian Gerth. 2023
Dieses Buch behandelt die Rolle von Künstlicher Intelligenz (KI) im Kontext der fortlaufenden Digitalisierung und Automatisierung in Unternehmen, um Wertschöpfung zu…
optimieren, neue Geschäftsmodelle zu entwickeln oder bestehende zu transformieren. Untersucht werden Voraussetzungen, Implementierung und Anwendung von KI in datenbasierten Geschäftsmodellen und dabei sowohl Chancen als auch Risiken beleuchtet.Der erste Buchabschnitt konzentriert sich auf die erforderlichen Bedingungen für den erfolgreichen Einsatz von KI. Hierzu zählen die Erfassung und Verarbeitung von Daten, der Aufbau einer robusten IT-Infrastruktur und die Personalschulung. Im zweiten Abschnitt wird die Implementierung von KI diskutiert. Besonderer Fokus liegt dabei auf dem Aufbau und Training von KI-Systemen und deren Integration in bestehende Geschäftsprozesse. Verschiedene Ansätze der KI, wie Machine Learning und Deep Learning, werden erläutert und ihre Anwendungsmöglichkeiten aufgezeigt. Der dritte Abschnitt widmet sich der praktischen Anwendung von KI in verschiedenen Branchen und Geschäftsmodellen. So werden etwa Beispiele aus der Produktion, dem Handel und der Dienstleistungsbranche vorgestellt, um den Einsatz von KI zur Automatisierung von Prozessen, Optimierung von Entscheidungen und Verbesserung von Prognosen zu demonstrieren.Insgesamt bietet das Buch eine umfassende Perspektive auf das Thema KI und liefert in 17 Kapiteln wertvolle Anregungen für Unternehmen, um ihre Zukunftsfähigkeit mit KI zu sichern und von den Möglichkeiten zu profitieren. Die Beiträge von führenden Expert:innen aus unterschiedlichen Disziplinen, mit verschiedenen theoretischen Ansätzen, methodischen Zugängen und empirischen Befunden beleuchten und diskutieren das Thema sehr anschaulich.Winning with Data Science: A Handbook for Business Leaders
Par Howard Steven Friedman, Akshay Swaminathan. 2024
Whether you are a newly minted MBA or a project manager at a Fortune 500 company, data science will play…
a major role in your career. Knowing how to communicate effectively with data scientists in order to obtain maximum value from their expertise is essential. This book is a compelling and comprehensive guide to data science, emphasizing its real-world business applications and focusing on how to collaborate productively with data science teams.Taking an engaging narrative approach, Winning with Data Science covers the fundamental concepts without getting bogged down in complex equations or programming languages. It provides clear explanations of key terms, tools, and techniques, illustrated through practical examples. The book follows the stories of Kamala and Steve, two professionals who need to collaborate with data science teams to achieve their business goals. Howard Steven Friedman and Akshay Swaminathan walk readers through each step of managing a data science project, from understanding the different roles on a data science team to identifying the right software. They equip readers with critical questions to ask data analysts, statisticians, data scientists, and other technical experts to avoid wasting time and money. Winning with Data Science is a must-read for anyone who works with data science teams or is interested in the practical side of the subject.Global Digital Data Governance: Polycentric Perspectives (Routledge Global Cooperation Series)
Par Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte. 2024
This book provides a nuanced exploration of contemporary digital data governance, highlighting the importance of cooperation across sectors and disciplines…
in order to adapt to a rapidly evolving technological landscape. Most of the theory around global digital data governance remains scattered and focused on specific actors, norms, processes, or disciplinary approaches. This book argues for a polycentric approach, allowing readers to consider the issue across multiple disciplines and scales. Polycentrism, this book argues, provides a set of lenses that tie together the variety of actors, issues, and processes intertwined in digital data governance at subnational, national, regional, and global levels. Firstly, this approach uncovers the complex array of power centers and connections in digital data governance. Secondly, polycentric perspectives bridge disciplinary divides, challenging assumptions and drawing together a growing range of insights about the complexities of digital data governance. Bringing together a wide range of case studies, this book draws out key insights and policy recommendations for how digital data governance occurs and how it might occur differently. Written by an international and interdisciplinary team, this book will be of interest to students and scholars in the field of development studies, political science, international relations, global studies, science and technology studies, sociology, and media and communication studies.Handbook of Face Recognition
Par Stan Z. Li, Anil K. Jain, Jiankang Deng. 2024
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition – a task…
that humans perform routinely and effortlessly in our daily lives – still poses great challenges, especially in unconstrained conditions.This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational recognition systems. After a thorough introduction, each subsequent chapter focuses on a specific topic, reviewing background information, up-to-date techniques, and recent results, as well as offering challenges and future directions.Topics and features:Fully updated, revised, and expanded, covering the entire spectrum of concepts, methods, and algorithms for automated detection and recognition systemsProvides comprehensive coverage of face detection, alignment, feature extraction, and recognition technologies, and issues in evaluation, systems, security, and applicationsContains numerous step-by-step algorithmsDescribes a broad range of applications from person verification, surveillance, and security, to entertainmentPresents contributions from an international selection of preeminent expertsIntegrates numerous supporting graphs, tables, charts, and performance dataThis practical and authoritative reference is an essential resource for researchers, professionals and students involved in image processing, computer vision, biometrics, security, Internet, mobile devices, human-computer interface, E-services, computer graphics and animation, and the computer game industry.