Your Search Results

      • Trusted Partner
        Humanities & Social Sciences
        May 2020

        Constructing cybersecurity

        Power, expertise and the internet security industry

        by Andrew Whiting

        Constructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed analysis of the discourse produced by various internet security companies demonstrating the important role that these security professionals play constituting and entrenching this knowledge by virtue of their specific epistemic authority. As a relatively new source within a broader security dispositif these security professionals have created relationships of mutual recognition and benefit with traditional political and security professionals.

      • Databases
        September 2019

        Blockchain for Beginners

        by Yathish. R

        Ever gone through hundred and ten resources for blockchain and still not able to figure out where to start off. Well this book would lay the foundation for most of the concepts that you would require to at least get started somewhere and scratch the surface of this hyped technology. From the different underlying technicalities to the diversity of platforms, from the variety of scenarios where Blockchain fits to understanding when it would be an overkill, from learning the two most important platforms to getting you started for creating your own applications on top of them, from various simple humorous references to intriguing exercises, this book aims to not only make you feel comfortable with the technology but also confident enough to ponder more about it.

      • Computing & IT
        November 2019

        Research on the Theory and Application of Internet Group Collaboration

        by ZHU Qinghua et al.

        This book systematically discusses the theory and application of Internet group collaboration by tracing the birth of the concept, analyzing and theoretical discussion of Internet group collaboration, and selecting typical fields in the application of Internet group cooperation, including user role modeling, conflict influence and characteristics, network learning, online word-of-mouth and network public opinion as the main research content. This book helps to discover the potential application value of group collaboration in multiple fields, improving the knowledge accumulation and experience of Internet users at the micro level, helping platform operators to identify the market position, operation mode and development strategy, and building a positive, harmonious and equal Internet application ecological environment at the macro level.   This book can be read and referenced by the following readers: researchers in the fields of public management, information resource management and management science and engineering; employees of cultural memory institutions such as Internet group collaboration platform, non-profit organizations, libraries, museums, archives, etc.; and staff of government network environmental supervision department.   Table of Contents   Preface Chapter 1 Introduction Chapter 2 Concept Analysis and Theoretical Exploration of Internet Group Collaboration Chapter 3 User Roles and Modeling in Internet Group Collaboration Chapter 4 Impact and Characteristics of Conflict in Group Collaboration on the Internet -- Take Wikipedia as an Example Chapter 5 Network Learning Based on Internet Group Collaboration Chapter 6 Word of Mouth Based on Internet Group Collaboration Chapter 7 Online Public Opinion Based on Internet Group Collaboration -- Take Online Rumors as an Example Chapter 8 Summary Reference

      • Computer networking & communications
        April 2008

        The Minimum You Need to Know About Service Oriented Architecture

        by Roland Hughes

        2008 Best Books Award Winner in the category Business: Computers/Technology/Internet - USA Book News. Service Oriented Architecture is all the rage these days. Dozens, if not hundreds of books are published on it, and more seem to show up every day. This book isn't awash with buzzwords and jargon. In truth, this book will probably be shunned by the SOA eltie. Rather than focus on the front end, this book focuses on the back end. That Heritage data silo/application where all of the other books just draw a box with "connect somehow" written on it. Most of them try to sell some expensive midleware along the way. Management can and should read the first five chapters in the book. These chapters aren't technical and may very well open their eyes. The remaining chapters are for those programmers given the "connect somehow" task. While OpenVMS is the Heritage platform of choice in this book and Ubuntu is used for the front end development, developers from other platforms should get a lot of ideas by reading this book.

      • Computer security
        March 2010

        Assessing Information Security

        Strategies, Tactics, Logic and Framework

        by Andrew A. Vladimirov

        What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

      • Computer networking & communications

        Colorado

        by Carl Abbott, Stephen J. Leonard, Thomas J. Noel

        Since 1976, newcomers and natives alike have learned about the rich history of the magnificent place they call home from Colorado: A History of the Centennial State. In the fifth edition, coauthors Carl Abbott, Stephen J. Leonard, and Thomas J. Noel incorporate recent events, scholarship, and insights about the state in an accessible volume that general readers and students will enjoy. The new edition tells of conflicts, shifting alliances, and changing ways of life as Hispanic, European, and African American settlers flooded into a region that was already home to Native Americans. Providing a balanced treatment of the entire state’s history—from Grand Junction to Lamar and from Trinidad to Craig—the authors also reveal how Denver and its surrounding communities developed and gained influence. While continuing to elucidate the significant impact of mining, agriculture, manufacturing, and tourism on Colorado, the fifth edition broadens and focuses its coverage by consolidating material on Native Americans into one chapter and adding a new chapter on sports history. The authors also expand their discussion of the twentieth century with updated sections on the environment, economy, politics, and recent cultural conflicts. New illustrations, updated statistics, and an extensive bibliography including Internet resources enhance this edition.

      • Computer networking & communications

        Colorado Women

        by Beaton, Gail M.

        Worldwide rights available excluding English language rights for sale and distribution in Canada and the United States, including U.S. territories and possessions.

      • Computer networking & communications

        Gambling on Ore

        The Nature of Metal Mining in the United States, 1860-191

        by Kent Curtis

        Gambling on Ore examines the development of the western mining industry from the tumultuous and violent Gold Rush to the elevation of large-scale copper mining in the early twentieth century, using Montana as representative of mining developments in the broader US mining west. Employing abundant new historical evidence in key primary and secondary sources, Curtis tells the story of the inescapable relationship of mining to nature in the modern world as the United States moved from a primarily agricultural society to a mining nation in the second half of the nineteenth century.In Montana, legal issues and politics—such as unexpected consequences of federal mining law and the electrification of the United States—further complicated the mining industry’s already complex relationship to geology, while government policy, legal frameworks, dominant understandings of nature, and the exigencies of profit and production drove the industry in momentous and surprising directions. Despite its many uncertainties, mining became an important part of American culture and daily life.Gambling on Ore unpacks the tangled relationships between mining and the natural world that gave material possibility to the age of electricity. Metal mining has had a profound influence on the human ecology and the social relationships of North America through the twentieth century and throughout the world after World War II. Understanding how we forged these relationships is central to understanding the environmental history of the United States after 1850.

      • Computer networking & communications

        House on Lemon Street

        Japanese Pioneers & the American Dream

        by Mark Rawitsch

        In 1915, Jukichi and Ken Harada purchased a house on Lemon Street in Riverside, California. Close to their restaurant, church, and children's school, the house should have been a safe and healthy family home. Before the purchase, white neighbors objected because of the Haradas' Japanese ancestry, and the California Alien Land Law denied them real-estate ownership because they were not citizens. To bypass the law Mr. Harada bought the house in the names of his three youngest children, who were American-born citizens. Neighbors protested again, and the first Japanese American court test of the California Alien Land Law of 1913-The People of California v. Jukichi Harada-was the result. Bringing this little-known story to light, The House on Lemon Street details the Haradas' decision to fight for the American dream. Chronicling their experiences from their immigration to the United States through their legal battle over their home, their incarceration during World War II, and their lives after the war, this book tells the story of the family's participation in the struggle for human and civil rights, social justice, property and legal rights, and fair treatment of immigrants in the United States. The Harada family's quest for acceptance illuminates the deep underpinnings of anti-Asian animus, which set the stage for Executive Order 9066, and recognizes fundamental elements of our nation's anti-immigrant history that continue to shape the American story. It will be worthwhile for anyone interested in the Japanese American experience in the twentieth century, immigration history, public history, and law.   This publication was made possible with the support of Naomi, Kathleen, Ken, and Paul Harada, who donated funds in memory of their father, Harold Shigetaka Harada, honoring his quest for justice and civil rights. Additional support for this publication was also provided, in part, by UCLA's Aratani Endowed Chair as well as Wallace T. Kido, Joel B. Klein, Elizabeth A. Uno, and Rosalind K. Uno.

      • Computer networking & communications

        Mercury and the Making of California

        Mining, Landscape, and Race, 1840-1890

        by Andrew Scott Johnston

        Mercury and the Making of California, Andrew Johnston’s multidisciplinary examination of the history and cultural landscapes of California’s mercury-mining industry, raises mercury to its rightful place alongside gold and silver in the development of the American West. Gold and silver could not be refined without mercury; therefore, its production and use were vital to securing power and wealth in the West. The first industrialized mining in California, mercury mining had its own particular organization, structure, and built environments. These were formed within the Spanish Empire, subsequently transformed by British imperial ambitions, and eventually manipulated by American bankers and investors. In California mercury mining also depended on a workforce differentiated by race and ethnicity. The landscapes of work and camp and the relations among the many groups involved in the industry—Mexicans, Chileans, Spanish, English, Irish, Cornish, American, and Chinese—form a crucial chapter in the complex history of race and ethnicity in the American West.This pioneering study explicates the mutual structuring of the built environments of the mercury-mining industry and the emergence of California’s ethnic communities. Combining rich documentary sources with a close examination of the existing physical landscape, Johnston explores both the detail of everyday work and life in the mines and the larger economic and social structures in which mercury mining was enmeshed, revealing the significance of mercury mining for Western history.

      • Computer networking & communications

        Passage to Wonderland

        Rephotographing Joseph Stimson's Views of the Cody Road to Yellowstone National Park, 1903 and 2008

        by Michael A. Amundson (Author) , Joseph Stimson (Photographer)

        In 1903 the Cody Road opened, leading travelers from Cody, Wyoming, to Yellowstone National Park. Cheyenne photographer J. E. Stimson traveled the route during its first week in existence, documenting the road for the state of Wyoming's contribution to the 1904 World's Fair. His images of now-famous landmarks like Cedar Mountain, the Shoshone River, the Holy City, Chimney Rock, Sylvan Pass, and Sylvan Lake are some of the earliest existing photographs of the route. In 2008, 105 years later, Michael Amundson traveled the same road, carefully duplicating Stimson's iconic original photographs. In Passage to Wonderland, these images are paired side by side and accompanied by a detailed explanation of the land and history depicted.   Amundson examines the physical changes along "the most scenic fifty miles in America" and explores the cultural and natural history behind them. This careful analysis of the paired images make Passage to Wonderland more than a "then and now" photography book--it is a unique exploration of the interconnectedness between the Old West and the New West. It will be a wonderful companion for those touring the Cody Road as well as those armchair tourists who can follow the road on Google Earth using the provided GPS coordinates.

      • Computer networking & communications

        Santa Rita del Cobre

        by Christopher J Huggard , Terrence M Humble

        The Spanish, Mexicans, and Americans, successively, mined copper for more than 200 years in Santa Rita, New Mexico. Starting in 1799 after an Apache man led the Spanish to the native copper deposits, miners at the site followed industry developments in the nineteenth century to create a network of underground mines. In the early twentieth century these works became part of the Chino Copper Company's open-pit mining operations-operations that would overtake Santa Rita by 1970. In Santa Rita del Cobre, Huggard and Humble detail these developments with in-depth explanations of mining technology, and describe the effects on and consequences for the workers, the community, and the natural environment. Originally known as El Cobre, the mining-military camp of Santa Rita del Cobre ultimately became the company town of Santa Rita, which after World War II evolved into an independent community. From the town's beginnings to its demise, its mixed-heritage inhabitants from Mexico and United States cultivated rich family, educational, religious, social, and labor traditions. Extensive archival photographs, many taken by officials of the Kennecott Copper Corporation, accompany the text, providing an important visual and historical record of a town swallowed up by the industry that created it.

      • Computer networking & communications

        Season of Terror

        The Espinosas in Central Colorado, March-October 1863

        by Charles F. Price

        Season of Terror is the first book-length treatment of the little-known true story of the Espinosas—serial murderers with a mission to kill every Anglo in Civil War–era Colorado Territory—and the men who brought them down.    For eight months during the spring and fall of 1863, brothers Felipe Nerio and José Vivián Espinosa and their young nephew, José Vincente, New Mexico–born Hispanos, killed and mutilated an estimated thirty-two victims before their rampage came to a bloody end. Their motives were obscure, although they were members of the Penitentes, a lay Catholic brotherhood devoted to self-torture in emulation of the sufferings of Christ, and some suppose they believed themselves inspired by the Virgin Mary to commit their slaughters. Until now, the story of their rampage has been recounted as lurid melodrama or ignored by academic historians. Featuring a fascinating array of frontier characters, Season of Terrorexposes this neglected truth about Colorado’s past and examines the ethnic, religious, political, military, and moral complexity of the controversy that began as a regional incident but eventually demanded the attention of President Lincoln.

      • Computer networking & communications

        Thomas F. Walsh

        by John Stewart (Author)

        Thomas F. Walsh tells the story of one of the West's wealthiest mining magnates - an Irish American prospector and lifelong philanthropist who struck it rich in Ouray County, Colorado.In the first complete biography of Thomas Walsh, John Stewart recounts the tycoon's life from his birth in 1850 and his beginnings as a millwright and carpenter in Ireland to his tenacious, often fruitless mining work in the Black Hills and Colorado, which finally led to his discovery of an extremely rich vein of gold ore in the Imogene Basin. Walsh's Camp Bird Mine yielded more than $20 million worth of gold and other minerals in twenty years, and the mine's 1902 sale to British investors made Walsh very wealthy.He achieved national prominence, living with his family in mansions in Colorado and Washington, D.C., and maintaining a rapport with Presidents McKinley, Theodore Roosevelt, and Taft, as well as King Leopold II of Belgium.Despite his fame and lavish lifestyle, Walsh is remembered as an unassuming and philanthropic man who treated his employees well. In addition to making many anonymous donations, he established the Walsh Library in Ouray and a library near his Irish birthplace, and helped establish a research fund for the study of radium and other rare western minerals at the Colorado School of Mines. Walsh gave his employees at the Camp Bird Mine top pay and lodged them in an alpine boardinghouse featuring porcelain basins, electric lighting, and excellent food.Stewart's engaging account explores the exceptional path of this Colorado mogul in detail, bringing Walsh and his time to life.

      • Computer networking & communications
        January 1989

        Information Technology and the Conduct of Research

        The User's View

        by Panel on Information Technology and the Conduct of Research, National Academy of Sciences, National Academy of Engineering, Institute of Medicine

        Computers and telecommunications have revolutionized the processes of scientific research. How is this information technology being applied and what difficulties do scientists face in using information technology? How can these difficulties be overcome? Information Technology and the Conduct of Research answers these questions and presents a variety of helpful examples. The recommendations address the problems scientists experience in trying to gain the most benefit from information technology in scientific, engineering, and clinical research.

      • Computer networking & communications
        January 1987

        Mental Models in Human-Computer Interaction

        Research Issues About What the User of Software Knows

        by Committee on Human Factors, National Research Council

        Special copy

      • Computer networking & communications
        June 1996

        Bridge Builders

        African Experiences With Information and Communication Technology

        by Panel on Planning for Scientific and Technological Information (STI) Systems in Sub-Saharan Africa, National Research Council

        This volume tells 16 remarkable stories--first person accounts of how information and communication technologies have been successfully introduced into institutions for the benefit of scientists and engineers in sub-Saharan Africa. These case studies focus on the lessons learned in designing and implementing projects dealing with scientific and technological information and examine the impact.

      • Computer networking & communications
        May 1997

        Traffic Management for High-Speed Networks

        Fourth Lecture International Science Lecture Series

        by by H.T. Kung, Gordon McKay Professor of Electrical Engineering and Computer Science, Harvard University

      Subscribe to our

      newsletter