Your Search Results

      • Trusted Partner
        Humanities & Social Sciences
        May 2020

        Constructing cybersecurity

        Power, expertise and the internet security industry

        by Andrew Whiting

        Constructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed analysis of the discourse produced by various internet security companies demonstrating the important role that these security professionals play constituting and entrenching this knowledge by virtue of their specific epistemic authority. As a relatively new source within a broader security dispositif these security professionals have created relationships of mutual recognition and benefit with traditional political and security professionals.

      • Databases
        September 2019

        Blockchain for Beginners

        by Yathish. R

        Ever gone through hundred and ten resources for blockchain and still not able to figure out where to start off. Well this book would lay the foundation for most of the concepts that you would require to at least get started somewhere and scratch the surface of this hyped technology. From the different underlying technicalities to the diversity of platforms, from the variety of scenarios where Blockchain fits to understanding when it would be an overkill, from learning the two most important platforms to getting you started for creating your own applications on top of them, from various simple humorous references to intriguing exercises, this book aims to not only make you feel comfortable with the technology but also confident enough to ponder more about it.

      • Computing & IT
        November 2019

        Research on the Theory and Application of Internet Group Collaboration

        by ZHU Qinghua et al.

        This book systematically discusses the theory and application of Internet group collaboration by tracing the birth of the concept, analyzing and theoretical discussion of Internet group collaboration, and selecting typical fields in the application of Internet group cooperation, including user role modeling, conflict influence and characteristics, network learning, online word-of-mouth and network public opinion as the main research content. This book helps to discover the potential application value of group collaboration in multiple fields, improving the knowledge accumulation and experience of Internet users at the micro level, helping platform operators to identify the market position, operation mode and development strategy, and building a positive, harmonious and equal Internet application ecological environment at the macro level.   This book can be read and referenced by the following readers: researchers in the fields of public management, information resource management and management science and engineering; employees of cultural memory institutions such as Internet group collaboration platform, non-profit organizations, libraries, museums, archives, etc.; and staff of government network environmental supervision department.   Table of Contents   Preface Chapter 1 Introduction Chapter 2 Concept Analysis and Theoretical Exploration of Internet Group Collaboration Chapter 3 User Roles and Modeling in Internet Group Collaboration Chapter 4 Impact and Characteristics of Conflict in Group Collaboration on the Internet -- Take Wikipedia as an Example Chapter 5 Network Learning Based on Internet Group Collaboration Chapter 6 Word of Mouth Based on Internet Group Collaboration Chapter 7 Online Public Opinion Based on Internet Group Collaboration -- Take Online Rumors as an Example Chapter 8 Summary Reference

      • Computer networking & communications
        April 2008

        The Minimum You Need to Know About Service Oriented Architecture

        by Roland Hughes

        2008 Best Books Award Winner in the category Business: Computers/Technology/Internet - USA Book News. Service Oriented Architecture is all the rage these days. Dozens, if not hundreds of books are published on it, and more seem to show up every day. This book isn't awash with buzzwords and jargon. In truth, this book will probably be shunned by the SOA eltie. Rather than focus on the front end, this book focuses on the back end. That Heritage data silo/application where all of the other books just draw a box with "connect somehow" written on it. Most of them try to sell some expensive midleware along the way. Management can and should read the first five chapters in the book. These chapters aren't technical and may very well open their eyes. The remaining chapters are for those programmers given the "connect somehow" task. While OpenVMS is the Heritage platform of choice in this book and Ubuntu is used for the front end development, developers from other platforms should get a lot of ideas by reading this book.

      • Computer security
        March 2010

        Assessing Information Security

        Strategies, Tactics, Logic and Framework

        by Andrew A. Vladimirov

        What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

      • Computer networking & communications

        Colorado

        by Carl Abbott, Stephen J. Leonard, Thomas J. Noel

        Since 1976, newcomers and natives alike have learned about the rich history of the magnificent place they call home from Colorado: A History of the Centennial State. In the fifth edition, coauthors Carl Abbott, Stephen J. Leonard, and Thomas J. Noel incorporate recent events, scholarship, and insights about the state in an accessible volume that general readers and students will enjoy. The new edition tells of conflicts, shifting alliances, and changing ways of life as Hispanic, European, and African American settlers flooded into a region that was already home to Native Americans. Providing a balanced treatment of the entire state’s history—from Grand Junction to Lamar and from Trinidad to Craig—the authors also reveal how Denver and its surrounding communities developed and gained influence. While continuing to elucidate the significant impact of mining, agriculture, manufacturing, and tourism on Colorado, the fifth edition broadens and focuses its coverage by consolidating material on Native Americans into one chapter and adding a new chapter on sports history. The authors also expand their discussion of the twentieth century with updated sections on the environment, economy, politics, and recent cultural conflicts. New illustrations, updated statistics, and an extensive bibliography including Internet resources enhance this edition.

      • Computer networking & communications

        Colorado Women

        by Beaton, Gail M.

        Worldwide rights available excluding English language rights for sale and distribution in Canada and the United States, including U.S. territories and possessions.

      • Computer networking & communications
        January 1989

        Information Technology and the Conduct of Research

        The User's View

        by Panel on Information Technology and the Conduct of Research, National Academy of Sciences, National Academy of Engineering, Institute of Medicine

        Computers and telecommunications have revolutionized the processes of scientific research. How is this information technology being applied and what difficulties do scientists face in using information technology? How can these difficulties be overcome? Information Technology and the Conduct of Research answers these questions and presents a variety of helpful examples. The recommendations address the problems scientists experience in trying to gain the most benefit from information technology in scientific, engineering, and clinical research.

      • Computer networking & communications
        January 1987

        Mental Models in Human-Computer Interaction

        Research Issues About What the User of Software Knows

        by Committee on Human Factors, National Research Council

        Special copy

      • Computer networking & communications
        June 1996

        Bridge Builders

        African Experiences With Information and Communication Technology

        by Panel on Planning for Scientific and Technological Information (STI) Systems in Sub-Saharan Africa, National Research Council

        This volume tells 16 remarkable stories--first person accounts of how information and communication technologies have been successfully introduced into institutions for the benefit of scientists and engineers in sub-Saharan Africa. These case studies focus on the lessons learned in designing and implementing projects dealing with scientific and technological information and examine the impact.

      • Computer networking & communications
        May 1997

        Traffic Management for High-Speed Networks

        Fourth Lecture International Science Lecture Series

        by by H.T. Kung, Gordon McKay Professor of Electrical Engineering and Computer Science, Harvard University

      • Computer networking & communications
        September 1997

        More Than Screen Deep

        Toward Every-Citizen Interfaces to the Nation's Information Infrastructure

        by Toward an Every-Citizen Interface to the NII Steering Committee, National Research Council

        The national information infrastructure (NII) holds the promise of connecting people of all ages and descriptions--bringing them opportunities to interact with businesses, government agencies, entertainment sources, and social networks. Whether the NII fulfills this promise for everyone depends largely on interfaces--technologies by which people communicate with the computing systems of the NII. More Than Screen Deep addresses how to ensure NII access for every citizen, regardless of age, physical ability, race/ethnicity, education, ability, cognitive style, or economic level. This thoughtful document explores current issues and prioritizes research directions in creating interface technologies that accommodate every citizen's needs. The committee provides an overview of NII users, tasks, and environments and identifies the desired characteristics in every-citizen interfaces, from power and efficiency to an element of fun. The book explores: Technological advances that allow a person to communicate with a computer system. Methods for designing, evaluating, and improving interfaces to increase their ultimate utility to all people. Theories of communication and collaboration as they affect person-computer interactions and person-person interactions through the NII. Development of agents: intelligent computer systems that "understand" the user's needs and find the solutions. Offering data, examples, and expert commentary, More Than Screen Deep charts a path toward enabling the broadest-possible spectrum of citizens to interact easily and effectively with the NII. This volume will be important to policymakers, information system designers and engineers, human factors professionals, and advocates for special populations.

      • Computer networking & communications
        June 1997

        Computer Science and Artificial Intelligence

        by Panel on Computer Science and Artificial Intelligence, National Research Council

        The focus of this report is on artificial intelligence (AI) and human-computer interface (HCI) technology. Observations, conclusions, and recommendations regarding AI and HCI are presented in terms of six grand challenge areas which serve to identify key scientific and engineering issues and opportunities. Chapter 1 presents the panel's definitions of these and related terms. Chapter 2 presents the panel's general observations and recommendations regarding AI and HCI. Finally, Chapter 3 discusses computer science, AI, and HCI in terms of the six selected "grand challenge" areas and three time horizons, that is, short term (within the next 2 years), midterm (2 to 6 years), and long term (more than 6 years from now) and presents additional recommendations in these areas.

      • Computer networking & communications
        January 1994

        Realizing the Information Future

        The Internet and Beyond

        by NRENAISSANCE Committee, National Research Council

        The potential impact of the information superhighway--what it will mean to daily work, shopping, and entertainment--is of concern to nearly everyone. In the rush to put the world on-line, special issues have emerged for researchers, educators and students, and library specialists. At the same time, the research and education communities have a valuable head start when it comes to understanding computer communications networks, particularly Internet. With its roots in the research community, the Internet computer network now links tens of millions of people and extends well into the commercial world. Realizing the Information Future is written by key players in the development of Internet and other data networks. The volume highlights what we can learn from Internet and how the research, education, and library communities can take full advantage of the information highway's promised reach through time and space. This book presents a vision for the proposed national information infrastructure (NII): an open data network sending information services of all kinds, from suppliers of all kinds, to customers of all kinds, across network providers of all kinds. Realizing the Information Future examines deployment issues for the NII in light of the proposed system architecture, with specific discussion of the needs of the research and education communities. What is the role of the "institution" when everyone is on-line in their homes and offices? What are the consequences when citizens can easily access legal, medical, educational, and government services information from a single system? These and many other important questions are explored. The committee also looks at the development of principles to address the potential for abuse and misuse of the information highway, covering Equitable and affordable access to the network. Reasonable approaches to controlling the rising tide of electronic information. Rights and responsibilities relating to freedom of expression, intellectual property, individual privacy, and data security. Realizing the Information Future includes a wide-ranging discussion of costs, pricing, and federal funding for network development and a discussion of the federal role in making the best technical choices to ensure that the expected social and economic benefits of the NII are realized. The time for the research and education communities to have their say about the information highway is before the ribbon is cut. Realizing the Information Future provides a timely, readable, and comprehensive exploration of key issues--important to computer scientists and engineers, researchers, librarians and their administrators, educators, and individuals interested in the shape of the information network that will soon link us all.

      • Computer networking & communications
        December 1994

        Virtual Reality

        Scientific and Technological Challenges

        by Nathaniel I. Durlach and Anne S. Mavor, Editors; Committee on Virtual Reality Research and Development, National Research Council

        Despite widespread interest in virtual reality, research and development efforts in synthetic environments (SE)--the field encompassing virtual environments, teleoperation, and hybrids--have remained fragmented. Virtual Reality is the first integrated treatment of the topic, presenting current knowledge along with thought-provoking vignettes about a future where SE is commonplace. This volume discusses all aspects of creating a system that will allow human operators to see, hear, smell, taste, move about, give commands, respond to conditions, and manipulate objects effectively in a real or virtual environment. The committee of computer scientists, engineers, and psychologists on the leading edge of SE development explores the potential applications of SE in the areas of manufacturing, medicine, education, training, scientific visualization, and teleoperation in hazardous environments. The committee also offers recommendations for development of improved SE technology, needed studies of human behavior and evaluation of SE systems, and government policy and infrastructure.

      • Computer networking & communications
        January 1994

        Research Recommendations to Facilitate Distributed Work

        by Technology and Telecommunications: Issues and Impacts Committee, National Research Council

        This book sets out technological research topics designed to facilitate and expand distributed work--including telecommuting, working while mobile, and working in geographically distributed teams. The book's recommendations for computing and communications infrastructure center on the provision and use of bandwidth--or the speed of communications. Concurrent applications research should be focused on ease of use and interoperability of the multitude of devices and programs that currently are needed to engage in distributed work.

      • Computer networking & communications
        May 1995

        Keeping the U.S. Computer and Communications Industry Competitive

        Convergence of Computing, Communications, and Entertainment

        by Computer Science and Technology Board, National Research Council

        Interactive multimedia and information infrastructure receive a lot of attention in the press, but what do they really mean for society? What are the most significant and enduring innovations? What does the convergence of digitally based technologies mean for U.S. businesses and consumers? This book presents an overview of the exciting but much-hyped phenomenon of digital convergence.

      • Computer networking & communications
        January 1994

        Rights and Responsibilities of Participants in Networked Communities

        by Dorothy E. Denning and Herbert S. Lin, Editors; Steering Committee on Rights and Responsibilities of Participants in Networked Communities, National Research Council

        This book describes a number of social and legal issues as they relate to various members of electronically networked communities. After a brief introduction to relevant legal precedents and to the manner in which societies develop norms for social behavior, the book explores right and responsibilities related to free speech, vandalism, property interests, and privacy.

      Subscribe to our

      newsletter