Catalog Search Results
Author
Pub. Date
2018.
Language
English
Description
Using information in its everyday, nonspecialized sense, Michael Buckland explores the influence of information on what we know, the role of communication and recorded information in our daily lives, and the difficulty (or ease) of finding information. He shows that all this involves human perception, social behavior, changing technologies, and issues of trust. Buckland argues that every society is an "information society"; a "non-information society"...
Author
Pub. Date
2019.
Language
English
Description
Artificial Intelligence in Practice is a fascinating look into how companies use AI and machine learning to solve problems. Presenting fifty case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe. The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment. Artificial...
Author
Pub. Date
2019.
Language
English
Description
Blockchain is transforming business. What's your strategy? Forward-thinking organizations such as the Australian Stock Exchange, Equinor, the City of Austin, and dozens of others are exploring how blockchain can transform the way they create and seek value. Whether to streamline multi-party processes, create and trade new assets, or leverage artificial intelligence and the Internet of Things, blockchain enables entirely new business opportunities....
Author
Pub. Date
2019.
Language
English
Description
Can blockchain solve your biggest business problem? While the world is transfixed by bitcoin mania, your competitors are tuning out the noise and making strategic bets on blockchain. Your rivals are effortlessly tracking every last link in their supply chains. They're making bureaucratic paper trails obsolete while keeping their customers' data safer and discovering new ways to use this next foundational technology to sustain their competitive advantage....
Author
Pub. Date
2018.
Language
English
Description
As executives build and nurture their organization's strategic agility in today's turbulent, uncertain business environment, the ability to lead strategic change has become more critical than ever. The Strategic Project Leader: Mastering Service-Based Project Leadership, Second Edition will help project managers lead with confidence in temporary, ambiguous team structures that execute risk-laden work in an increasingly agile project environment. This...
Author
Language
English
Formats
Description
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information...
Author
Pub. Date
2014
Language
English
Description
Comprehensive guide to Visual Studio 2013
Visual Studio is your essential tool for Windows programming. Visual Studio 2013 features important updates to the user interface and to productivity. In Professional Visual Studio 2013, author, Microsoft Certified Trainer, and Microsoft Visual C# MVP Bruce Johnson brings three decades of industry experience to guide you through the update, and he doesn't just gloss over the basics. With his unique IDE-centric...
Author
Language
English
Formats
Description
The investigator's practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective...
Author
Pub. Date
2020.
Language
English
Description
The must-have preparation guide for MCA Modern Desktop certification-covers the new Exam MD-101: Managing Modern Desktops!
Microsoft's Modern Desktop integrates Windows 10, Office 365, and advanced security capabilities. Microsoft 365 Certified Associate (MCA) Modern Desktop certification candidates need to be familiar with Microsoft 365 workloads and demonstrate proficiency in deploying, configuring, and maintaining Windows 10 and non-Windows devices...
Author
Language
English
Formats
Description
For Readers of Ray Kurzweil and Michio Kaku, a New Look at the Cutting Edge of Artificial Intelligence
Imagine a robotic stuffed animal that can read and respond to a child's emotional state, a commercial that can recognize and change based on a customer's facial expression, or a company that can actually create feelings as though a person were experiencing them naturally. Heart of the Machine explores the next giant step in the relationship between...
Author
Series
Pub. Date
2014
Language
English
Description
A practical Wrox guide to ARM programming for mobile devices
With more than 90 percent of mobile phones sold in recent years using ARM-based processors, developers are eager to master this embedded technology. If you know the basics of C programming, this guide will ease you into the world of embedded ARM technology. With clear explanations of the systems common to all ARM processors and step-by-step instructions for creating an embedded application,...
Author
Pub. Date
2019.
Language
English
Description
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators....
Author
Pub. Date
[2021]
Language
English
Description
"A book that introduces readers to the fundamentals of hardware and software. It covers foundational aspects of computing, from binary and circuit design to the internet and modern computing, and includes a mix of exercises and hands-on activities"--
Author
Pub. Date
Â2019
Language
English
Description
A few decades into the digital era, scientists discovered that thinking in terms of computation made possible an entirely new way of organizing scientific investigation; eventually, every field had a computational branch: computational physics, computational biology, and computational sociology. More recently, "computational thinking" has become part of the K-12 curriculum. But what is computational thinking? This volume in the MIT Press Essential...
16) Data science
Author
Pub. Date
Â2018
Language
English
Description
It has never been easier for organizations to gather, store, and process data. Use of data science is driven by the rise of big data and social media, the development of high-performance computing, and the emergence of such powerful methods for data analysis and modeling as deep learning. Data science encompasses a set of principles, problem definitions, algorithms, and processes for extracting non-obvious and useful patterns from large datasets....
Author
Series
Language
English
Formats
Description
Meet the world's top ethical hackers and explore the tools of the trade
“Hacking the Hacker” takes you inside the world of cybersecurity to show you what goes on behind the scenes and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary...
Author
Series
Pub. Date
2019.
Language
English
Description
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.
The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. “Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive...
Author
Pub. Date
Â2018
Language
English
Description
Based primarily on interviews and evaluations of existing practices and policies, this book emphasizes why companies must have social media policies and why they are important in governing employee behavior. Good companies pay attention to the social networking sites their customers and employees inhabit. They watch behaviors, they listen to concerns, they apologize when their companies make mistakes, they are transparent and honest, and engage their...
Author
Pub. Date
2018
Language
English
Description
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request