Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Everything posted by Jessica Brown

  1. Jessica Brown posted a post in a topic in Linux
    Linux Forensics /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux Forensics by Philip Polstra Publisher CreateSpace Independent Publishing Platform Published Date 2015-07-13 Page Count 370 Categories Computers / Operating Systems / General, Computers / Operating Systems / Linux, Computers / Security / General, Law / Forensic Science Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1515037630 Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensicson Linux systems. It is also a great asset for anyone that would like to better understand Linux internals. Linux Forensics will guide you step by step through the process of investigating a computer running Linux. Everything you need to know from the moment you receive the call from someone who thinks they have been attacked until the final report is written is covered in this book. All of the tools discussed in this book are free and most are also open source. Dr. Philip Polstra shows how to leverage numerous tools such as Python, shell scripting, and MySQL to quickly, easily, and accurately analyze Linux systems. While readers will have a strong grasp of Python and shell scripting by the time they complete this book, no priorknowledge of either of these scripting languages is assumed. Linux Forensics begins by showing you how to determine if there was an incident with minimally invasive techniques. Once it appears likely that an incident has occurred, Dr. Polstra shows you how to collect data from a live system before shutting it down for the creation of filesystem images. Linux Forensics contains extensive coverage of Linux ext2, ext3, and ext4 filesystems. A large collection of Python and shell scripts for creating, mounting, and analyzing filesystem images are presented in this book. Dr. Polstra introduces readers to the exciting new field of memory analysis using the Volatility framework. Discussions of advanced attacks and malware analysis round out the book. Book Highlights 370 pages in large, easy-to-read 8.5 x 11 inch format Over 9000 lines of Python scripts with explanations Over 800 lines of shell scripts with explanations A 102 page chapter containing up-to-date information on the ext4 filesystem Two scenarios described in detail with images available from the book website All scripts and other support files are available from the book website Chapter Contents First Steps General Principles Phases of Investigation High-level Process Building a Toolkit Determining If There Was an Incident Opening a Case Talking to Users Documenation Mounting Known-good Binaries Minimizing Disturbance to the Subject Automation With Scripting Live Analysis Getting Metadata Using Spreadsheets Getting Command Histories Getting Logs Using Hashes Dumping RAM Creating Images Shutting Down the System Image Formats DD DCFLDD Write Blocking Imaging Virtual Machines Imaging Physical Drives Mounting Images Master Boot Record Based Partions GUID Partition Tables Mounting Partitions In Linux Automating With Python Analyzing Mounted Images Getting Timestamps Using LibreOffice Using MySQL Creating Timelines Extended Filesystems Basics Superblocks Features Using Python Finding Things That Are Out Of Place Inodes Journaling Memory Analysis Volatility Creating Profiles Linux Commands Dealing With More Advanced Attackers Malware Is It Malware? Malware Analysis Tools Static Analysis Dynamic Analysis Obfuscation The Road Ahead Learning More Communities Conferences Certifications More Information
  2. Red Hat Linux /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Red Hat Linux The Complete Reference by Richard Petersen Publisher McGraw-Hill/Osborne Published Date 2002 Page Count 1117 Categories Computers / Networking / General, Computers / Operating Systems / Linux, Computers / Networking / Hardware, Juvenile Nonfiction / Computers / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0072191783 This second edition includes updated material with coverage on the: Linux kernel 2.4, Gnome 1.4 and the K Desktop, KDE 2.0. It also covers Red Hat supported servers such as Tux and thttpd Web servers and the CUPS print server. As part of the book's coverage of the Linux kernel 2.4, the author walks through network security features of IP-tables. The book focuses on the different ways Red Hat presents its distribution - a desktop workstation, network workstation, server, and development platform. The CD contains a trial version of Red Hat 7.1. More Information
  3. Fedora 9 and Red Hat Enterprise Linux Bible /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Fedora 9 and Red Hat Enterprise Linux Bible by Chris Negus Publisher John Wiley & Sons, Limited Published Date 2008-07 Page Count 1080 Categories Mathematics / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 055504338X Explains the features of Fedora 9 and Enterprise Linux, offering instructions on its installation, desktop interface, network and server set-up, and key system administration skills. More Information
  4. Cloud Computing Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Computing Security Foundations and Challenges by John R. Vacca Publisher CRC Press Published Date 2020-11-09 Page Count 522 Categories Computers / Programming / Games, Computers / Computer Science, Computers / Information Technology, Computers / Security / Network Security, Computers / Security / General, Computers / Computer Engineering, Computers / Internet / General, Computers / Online Services, Computers / Distributed Systems / Cloud Computing, Games & Activities / Video & Mobile, Law / Computer & Internet Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0367151162 This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features - Covers patching and configuration vulnerabilities of a cloud server - Evaluates methods for data encryption and long-term storage in a cloud server - Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. More Information
  5. Cloud Computing Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Computing Security Foundations and Challenges by John R. Vacca Publisher CRC Press Published Date 2017 Page Count 492 Categories Computers / General, Computers / Programming / Games, Computers / Information Technology, Computers / Security / Network Security, Computers / Security / General, Computers / Computer Engineering, Computers / Internet / General, Computers / Online Services, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1482260948 This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. More Information
  6. Amazon Web Services Bootcamp /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Amazon Web Services Bootcamp Develop a Scalable, Reliable, and Highly Available Cloud Environment with AWS by Sunil Gulabani Publisher Packt Publishing Published Date 2018-03-30 Page Count 338 Categories Computers / Business & Productivity Software / General, Computers / Networking / General, Computers / Distributed Systems / General, Computers / Programming / General, Computers / Software Development & Engineering / Tools, Computers / Internet / Web Services & APIs, Computers / Distributed Systems / Cloud Computing Language EN Average Rating 4 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1788294459 This fast-paced guide will quickly enhance your skills to develop a highly scalable Cloud environmentAbout This Book* Efficiently build a highly scalable and reliable cloud environment for your applications with AWS* Leverage the various AWS components and services to build a secure, reliable, and robust environment to host your applications on* This quick-start guide will quickly enhance your skills to develop highly scalable servicesWho This Book Is ForThis book is for IT professionals and system administrators looking to design, deploy, and manage your applications and services on the AWS cloud platform. It's also ideal for developers looking to build highly scalable cloud-based services. A basic understanding of AWS would be beneficial.What You Will Learn* Find out about IAM to access AWS services securely* Explore EC2 (virtual server) and scale up/down your application based on heavy traffic* Learn about unlimited data storage service S3 and host a static website within minutes* Get to grips with Relational Databases and NoSQL databases under the AWS ecosystem* Understand the caching mechanism* Get to know about notifications service and monitor AWS services* Secure and troubleshoot your AWS architectureIn DetailAWS is at the forefront of Cloud Computing today. Businesses are adopting AWS Cloud because of its reliability, versatility, and flexible design. The main focus of this book is teaching you how to build and manage highly reliable and scalable applications and services on AWS. It will provide you with all the necessary skills to design, deploy, and manage your applications and services on the AWS cloud platform. We'll start by exploring Amazon S3, EC2, and so on to get you well-versed with core Amazon services. Moving on, we'll teach you how to design and deploy highly scalable and optimized workloads. You'll also discover easy-to-follow, hands-on steps, tips, and recommendations throughout the book and get to know essential security and troubleshooting concepts. By the end of the book, you'll be able to create a highly secure, fault tolerant, and scalable environment for your applications to run on.Style and approachThis book is all about fast and intensive learning. That means we don't waste time helping you get started. The new features provided by AWS resources are being covered with highly-effective examples to develop new things, demonstrating different ways to create and use the AWS resources efficiently. More Information
  7. System on Chip Design Languages /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } System on Chip Design Languages Extended papers: best of FDL’01 and HDLCon’01 by Anne Mignotte, Eugenio Villar, Lynn Horobin Publisher Springer Science & Business Media Published Date 2013-04-17 Page Count 284 Categories Computers / Languages / General, Computers / Computer Science, Computers / Hardware / General, Computers / Design, Graphics & Media / CAD-CAM, Computers / Artificial Intelligence / General, Computers / Programming / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1475766742 This book is the third in a series of books collecting the best papers from the three main regional conferences on electronic system design languages, HDLCon in the United States, APCHDL in Asia-Pacific and FDL in Europe. Being APCHDL bi-annual, this book presents a selection of papers from HDLCon'Ol and FDL'OI. HDLCon is the premier HDL event in the United States. It originated in 1999 from the merging of the International Verilog Conference and the Spring VHDL User's Forum. The scope of the conference expanded from specialized languages such as VHDL and Verilog to general purpose languages such as C++ and Java. In 2001 it was held in February in Santa Clara, CA. Presentations from design engineers are technical in nature, reflecting real life experiences in using HDLs. EDA vendors presentations show what is available - and what is planned-for design tools that utilize HDLs, such as simulation and synthesis tools. The Forum on Design Languages (FDL) is the European forum to exchange experiences and learn of new trends, in the application of languages and the associated design methods and tools, to design complex electronic systems. FDL'OI was held in Lyon, France, around seven interrelated workshops, Hardware Description Languages, Analog and Mixed signal Specification, C/C++ HW/SW Specification and Design, Design Environments & Languages, Real-Time specification for embedded Systems, Architecture Modeling and Reuse and System Specification & Design Languages. More Information
  8. Life 3.0 /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Life 3.0 Being Human in the Age of Artificial Intelligence by Max Tegmark Publisher Allen Lane Published Date 2017 Page Count 400 Categories Computers / Artificial Intelligence / General, Computers / Social Aspects, Computers / Human-Computer Interaction (HCI), Science / Philosophy & Social Aspects, Technology & Engineering / Automation, Technology & Engineering / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 024123719X What has A.I. brought us? Where will it lead us? The story of A.I. is the story of intelligence - of life processes as they evolve from bacteria (1.0) to humans (2.0), where life processes define their own software, to technology (3.0), where life processes design both their hardware and software. We know that A.I. is transforming work, laws, and weapons, as well as the dark side of computing- hacking and viral sabotage. It raises questions that we all need to address- What jobs should be automated? How should our legal systems handle autonomous systems? How likely is the emergence of suprahuman intelligence? Is it possible to control suprahuman intelligence? How do we ensure that the uses of A.I. remain beneficial? These are the issues at the heart of this book and its unique perspective, which seeks a ground apart from techno-skepticism and digital utopia. More Information
  9. Ghost in the Shell /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Ghost in the Shell by 士郎正宗, Tom Orzechowski, Susie Lee Publisher Dark Horse Manga Published Date 2004 Page Count 350 Categories Comics & Graphic Novels / General, Comics & Graphic Novels / Manga / General, Comics & Graphic Novels / Science Fiction, Comics & Graphic Novels / Manga / Science Fiction Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1593072287 Deep into the 21st century, the line between man and machine has been inexorably blurred. In this rapidly converging landscape, cyborg super-agent Major Motoko Kusanagi is charged to track down the most dangerous terrorists and cybercriminals, including "ghost hackers," capable of exploiting the human/machine interface by reprogramming human minds to become puppets to carry out their criminal ends. More Information
  10. Intelligence Science /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Intelligence Science by Zhongzhi Shi Publisher World Scientific Published Date 2012 Page Count 659 Categories Computers / Artificial Intelligence / General, Computers / Intelligence (AI) & Semantics, Computers / Computer Science, Computers / Data Science / General, Computers / Machine Theory, Computers / Programming / Algorithms, Computers / Bioinformatics, Computers / Data Science / Bioinformatics, Computers / Data Science / Machine Learning, Science / Bioinformatics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9814360775 Intelligence Science is an interdisciplinary subject dedicated to joint research on basic theory and technology of intelligence by brain science, cognitive science, artificial intelligence and others. Brain science explores the essence of brain research on the principle and model of natural intelligence at the molecular, cell and behavior level. Cognitive science studies human mental activity, such as perception, learning, memory, thinking, consciousness etc. In order to implement machine intelligence, artificial intelligence attempts simulation, extension and expansion of human intelligence using artificial methodology and technology. Research scientists from the above three disciplines work together to explore new concepts, new theories, and methodologies. This book will introduce the concept and methodology of intelligence science systematically. The whole book is divided into 18 chapters altogether. It can be regarded as a textbook in courses of intelligence science, cognitive science, cognitive informatics etc. for senior and graduate students. It has important reference value for researchers engaged in fields such as intelligence science, brain science, cognitive science, neural science, artificial intelligence, psychology and so on. More Information
  11. Progress in Artificial Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Progress in Artificial Intelligence by Luc Steels, J. A. Campbell Publisher E. Horwood Published Date 1985 Page Count 320 Categories Computers / Artificial Intelligence / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0853128308 No description available. More Information
  12. Metamagical Themas /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Metamagical Themas Questing for the Essence of Mind and Pattern by Douglas R. Hofstadter Publisher Bantam Books Published Date 1986 Page Count 852 Categories Philosophy / History & Surveys / Modern, Science / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0553342797 Hofstadter's bestselling collection of brilliant and quirky essays has been reissued to coincide with the paperback release of Fluid Concepts and Creative Analogies. "Reading Metamagical Themas is perhaps the closest thing imaginable to taking a voyage through a mind".--San Francisco Chronicle. 124 line drawings. More Information
  13. Underwater Robots /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Underwater Robots by Gianluca Antonelli Publisher Springer Published Date 2013-11-22 Page Count 279 Categories Technology & Engineering / Robotics, Computers / Artificial Intelligence / General, Technology & Engineering / Manufacturing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3319028774 This book, now at the third edition, addresses the main control aspects in underwater manipulation tasks. The mathematical model with significant impact on the control strategy is discussed. The problem of controlling a 6-degrees-of-freedoms autonomous underwater vehicle is deeply investigated and a survey of fault detection/tolerant strategies for unmanned underwater vehicles is provided. Inverse kinematics, dynamic and interaction control for underwater vehicle-manipulator systems are then discussed. The code used to generate most of the numerical simulations is made available and briefly discussed. More Information
  14. Exploring the JDS Linux Desktop /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Exploring the JDS Linux Desktop by Tom Adelstein, Sam Hiser Publisher "O'Reilly Media, Inc." Published Date 2004 Page Count 390 Categories Computers / General, Computers / Computer Science, Computers / Information Technology, Computers / Operating Systems / General, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Programming / General, Computers / Languages / Java Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0596007523 The Java Desktop System (TM), from Sun Microsystems, is a modern system for all kinds of users, novice through expert. As an unusually robust, well-integrated desktop system, it may become the first to fulfill the promise of mass adoption for open source. JDS brings Linux and other open source software up to a level of usability that makes them suitable for the enormous base of Personal Computer users including office workers, students, mobile and home users. It behaves pretty much the way a Windows or Mac user would expect, but with many more powerful features. JDS has seen widespread adoption in the United States, Britain, China, and elsewhere. This book is the ideal guide to JDS: it is clear and direct, but loaded with insights from authors who have spent time working with, supporting, and enhancing the system. Tom Adelstein is an award winning polymath system designer; Sam Hiser is a respected business consultant with an itch that led him to become the marketing project lead for OpenOffice.org. Both are advocates for open source and founders of the Open Government Interoperability Project, members of the Open Source Software Institute and contributors to the JDShelp.org project. This book carefully covers such housekeeping chores as setting up networking, updates, and backups. Then it enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing, spreadsheets, and slide presentations. A number of chapters and appendices concerning useful tools, including things you can add to your system, rounds out this remarkably useful book. It has plenty to offer the new user as well as the seasoned Linux professional. More Information
  15. Linux System Administration Handbook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux System Administration Handbook by Mark F. Komarinski, Cary Collett Publisher Prentice Hall PTR Published Date 1998 Page Count 384 Categories Computers / Operating Systems / General, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0136805965 The first true system administrator's book for Linux systems administration professionals! -- Technical and practical explanations of every major system administration task, including security, Internet setup, hardware configuration and file serving. -- Real-world help with administering Linux in heterogeneous networked environments. -- CD-ROM contains OpenLinux from Caldera -- the most popular business version of Linux!More and more businesses are turning to Linux as a cost-effective, rock-solid solution for Internal networks and Internet connectivity. This is the first book that systematically teaches Linux system administrators the real- world skills they'll need to succeed. Coverage includes everything you need to know to manage Linux networking, file service, E-mail, security, print sharing, Web, FTP and NetNews. Learn the latest practical information on configuring hardware and peripherals, customizing the kernel, tuning Linux performance, handling upgrades, and choosing among Linux distributions. Get more productive with the book's extensive practical scripts and automation techniques. There's nothing "academic" in this comprehensive guide: every word was written by expert system administrators who work with Linux every day -- and love it! More Information
  16. Jessica Brown posted a post in a topic in Linux
    Learning Linux Shell Scripting /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Learning Linux Shell Scripting by Ganesh Sanjiv Naik Publisher Packt Publishing Published Date 2015 Page Count 306 Categories Computers / Networking / General, Computers / Operating Systems / Linux, Computers / System Administration / Linux & UNIX Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1785286218 Unleash the power of shell scripts to solve real-world problems by breaking through the practice of writing tedious codeAbout This Book* Learn how to efficiently and effectively build shell scripts and develop advanced applications with this handy book* Develop high quality and efficient solutions by writing professional and real-world scripts, and debug scripts by checking and shell tracing* A step-by-step tutorial to automate routine tasks by developing scripts from a basic level to very advanced functionalityWho This Book Is ForThis book is ideal for those who are proficient at working with Linux and who want to learn about shell scripting to improve their efficiency and practical skills. By the end of this book, you will be able to confidently use your own shell scripts in the real world.What You Will Learn* Familiarize yourself with the various text filtering tools available in Linux* Combine the fundamental text and file processing commands to process data and automate repetitive tasks* Understand expressions and variables and how to use them practically* Automate decision-making and save a lot of time and effort of revisiting code* Get to grips with advanced functionality such as using traps and signals and using dialogs to develop screens* Start up a system and customize a Linux system* Take an in-depth look at regular expressions and pattern matching to understand the capabilities of scriptingIn DetailLinux is the one of the most powerful and universally adopted OSes. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell can read this file and act on the commands as if they were typed on the keyboard. Shell scripting is used to automate day-to-day administration, and for testing or product development tasks.This book covers Bash, GNU Bourne Again SHell, preparing you to work in the exciting world of Linux shell scripting. We start with an introduction to the Shell environment and explain basic commands used in Shell. Next we move on to check, kill, and control the execution of processes in Linux OS. Further, we teach you about the filter tools available in Linux and explain standard output and standard errors devices.Then we will ensure you understand Shell's interpretation of commands and get a firmer grasp so you use them in practice. Next, you'll experience some real-world essentials such as debugging and perform Shell arithmetic fluently. Then you'll take a step ahead and learn new and advanced topics in Shell scripting, such as starting up a system and customizing a Linux system. Finally, you'll get to understand the capabilities of scripting and learn about Grep, Stream Editor, and Awk.Style and approach This practical book will go from the very basics of shell scripting to complex, customized automation. The idea behind this book is to be as practical as possible and give you the look and feel of what real-world scripting is like. More Information
  17. One Jump Ahead /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } One Jump Ahead Computer Perfection at Checkers by Jonathan Schaeffer Publisher Springer Science & Business Media Published Date 2008-12-16 Page Count 585 Categories Computers / Artificial Intelligence / General, Computers / Mathematical & Statistical Software, Computers / Artificial Intelligence / Computer Vision & Pattern Recognition, Computers / User Interfaces, Computers / Information Technology, Mathematics / Discrete Mathematics, Computers / Optical Data Processing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 038776576X It’s hard to believe that it’s been over a decade since One Jump Ahead: Challenging Human Supremacy at Checkers was published. I’m delighted to have the oppor- nity to update and expand the book. The ?rst edition ended on a sad note and that was re?ected in the writing. It is now eleven years later and the project has come to a satisfying conclusion. Since its inception, the checkers project has consumed eighteen years of my life— twenty if you count the pre-CHINOOK and post-solving work. It’s hard for me to believe that I actually stuck with it for that long. My wife, Steph, would probably have something witty to say about my obsessive behavior. Rereading the book after a decade was dif?cult for me. When I originally wrote One Jump Ahead, I vowed to be candid in my telling of the story. That meant being honest about what went right and what went wrong. I have been criticized for being hard on some of the characters. That may be so, but I hope everyone will agree that the person receiving the most criticism was, justi?ably, me. I tried to be balanced in the storytelling, re?ecting things as they really happened and not as some sanitized everyone-lived-happily-ever-after tale. More Information
  18. The Discovery of the Artificial /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Discovery of the Artificial Behavior, Mind and Machines Before and Beyond Cybernetics by Roberto Cordeschi Publisher Springer Science & Business Media Published Date 2002-07-31 Page Count 312 Categories Computers / Artificial Intelligence / General, Computers / Cybernetics, History / General, History / Historiography, Medical / General, Philosophy / General, Philosophy / Mind & Body, Reference / General, Social Science / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1402006063 This series will include monographs and collections of studies devoted to the investigation and exploration of knowledge, information, and data processing systems of all kinds, no matter whether human, (other) animal, or machine. Its scope is intended to span the full range of interests from classical problems in the philosophy of mind and philosophical psychology through issues in cognitive psychology and sociobiology (concerning the mental capabilities of other species) to ideas related to artificial intelligence and to computer science. While primary emphasis will be placed upon theoretical, conceptual, and epistemological aspects of these problems and domains, empirical, experimental, and methodological studies will also appear from time to time. The present volume offers a broad and imaginative approach to the study of the mind, which emphasizes several themes, namely: the importance of functional organization apart from the specific material by means of which it may be implemented; the use of modeling to simulate these functional processes and subject them to certain kinds of tests; the use of mentalistic language to describe and predict the behavior of artifacts; and the subsumption of processes of adaptation, learning, and intelligence by means of explanatory principles. The author has produced a rich and complex, lucid and readable discussion that clarifies and illuminates many of the most difficult problems arising within this difficult domain. More Information
  19. Artificial Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial Intelligence Structures and Strategies for Complex Problem Solving by George F. Luger, William A. Stubblefield Publisher Addison-Wesley Published Date 1998 Page Count 824 Categories Computers / Artificial Intelligence / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0805311963 Combines the theoretical foundations of intelligent problem-solving with he data structures and algorithms needed for its implementation. The book presents logic, rule, object and agent-based architectures, along with example programs written in LISP and PROLOG. The practical applications of AI have been kept within the context of its broader goal: understanding the patterns of intelligence as it operates in this world of uncertainty, complexity and change. The introductory and concluding chapters take a new look at the potentials and challenges facing artificial intelligence and cognitive science.An extended treatment of knowledge-based problem-solving is given including model-based and case-based reasoning. Includes new material on:Fundamentals of search, inference and knowledge representatioAI algorithms and data structures in LISP and PROLOProduction systems, blackboards, and meta-interpreters including planers, rule-based reasoners, and inheritance systemsMachine-learning including ID3 with bagging and boosting, explanation based learning, PAC learning, and other forms of inductioNeural networks, including perceptrons, back propogation, Kohonen networks, Hopfield networks, Grossberg learning, and counterpropagationEmergent and social methods of learning and adaptation, including genetic algorithms, genetic programming and artificial lifeObject and agent-based problem solving and other forms of advanced knowledge representation More Information
  20. The Gendered Cyborg /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Gendered Cyborg A Reader by Gill Kirkup Publisher Psychology Press Published Date 2000 Page Count 333 Categories History / General, Medical / Reproductive Medicine & Technology, Science / Philosophy & Social Aspects, Social Science / Anthropology / Cultural & Social, Social Science / Feminism & Feminist Theory, Social Science / Media Studies, Technology & Engineering / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0415220904 The Gendered Cyborg explores the relationship between representation, technoscience and gender, through the metaphor of the cyborg. The contributors argue that the figure of the cyborg offers ways of thinking about the relationship between culture and technology, people and machines which disrupt the power of science to enfore the categories through which we think about being human: male and female. Taking inspiration from Donna Haraway's groundbreaking Manifesto for Cyborgs, the articles consider how the cyborg has been used in cultural representation from reproductive technology to sci-fi, and question whether the cyborg is as powerful a symbol as is often claimed. The different sections of the reader explore: * the construction of gender categories through science * the interraction of technoscience and gender in contemporary science fiction film such as Bladerunner and the Alien series * debates around modern reproductive technology such as ultrasound scans and IVF, assessing their benefits and constraints for women * issues relating to artificial intelligence and the internet. More Information
  21. The Reality of the Unobservable /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Reality of the Unobservable Observability, Unobservability and Their Impact on the Issue of Scientific Realism by E. Agazzi, M. Pauri Publisher Springer Science & Business Media Published Date 2013-04-17 Page Count 378 Categories Science / Philosophy & Social Aspects, Philosophy / Epistemology, Science / Physics / Quantum Theory, Computers / Artificial Intelligence / General, Science / Physics / Relativity, Philosophy / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9401593914 Observability and Scientific Realism It is commonly thought that the birth of modern natural science was made possible by an intellectual shift from a mainly abstract and specuJative conception of the world to a carefully elaborated image based on observations. There is some grain of truth in this claim, but this grain depends very much on what one takes observation to be. In the philosophy of science of our century, observation has been practically equated with sense perception. This is understandable if we think of the attitude of radical empiricism that inspired Ernst Mach and the philosophers of the Vienna Circle, who powerfully influenced our century's philosophy of science. However, this was not the atti tude of the f ounders of modern science: Galileo, f or example, expressed in a f amous passage of the Assayer the conviction that perceptual features of the world are merely subjective, and are produced in the 'anima!' by the motion and impacts of unobservable particles that are endowed uniquely with mathematically expressible properties, and which are therefore the real features of the world. Moreover, on other occasions, when defending the Copernican theory, he explicitly remarked that in admitting that the Sun is static and the Earth turns on its own axis, 'reason must do violence to the sense' , and that it is thanks to this violence that one can know the tme constitution of the universe. More Information
  22. Wireless AI /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Wireless AI Wireless Sensing, Positioning, IoT, and Communications by K. J. Ray Liu, Beibei Wang Publisher Cambridge University Press Published Date 2019-10-03 Page Count 622 Categories Computers / Artificial Intelligence / General, Computers / Internet of Things (IoT), Technology & Engineering / Electronics / General, Technology & Engineering / Power Resources / General, Technology & Engineering / Telecommunications, Technology & Engineering / Mobile & Wireless Communications, Technology & Engineering / Signals & Signal Processing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1108497861 With this groundbreaking text, discover how wireless artificial intelligence (AI) can be used to determine position at centimeter level, sense motion and vital signs, and identify events and people. Using a highly innovative approach that employs existing wireless equipment and signal processing techniques to turn multipaths into virtual antennas, combined with the physical principle of time reversal and machine learning, it covers fundamental theory, extensive experimental results, and real practical use cases developed for products and applications. Topics explored include indoor positioning and tracking, wireless sensing and analytics, wireless power transfer and energy efficiency, 5G and next-generation communications, and the connection of large numbers of heterogeneous IoT devices of various bandwidths and capabilities. Demo videos accompanying the book online enhance understanding of these topics. Providing a unified framework for wireless AI, this is an excellent text for graduate students, researchers, and professionals working in wireless sensing, positioning, IoT, machine learning, signal processing and wireless communications. More Information
  23. Search Methodologies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Search Methodologies Introductory Tutorials in Optimization and Decision Support Techniques by Edmund K. Burke, Graham Kendall Publisher Springer Science & Business Media Published Date 2006-03-20 Page Count 620 Categories Business & Economics / Operations Research, Mathematics / Applied, Computers / Artificial Intelligence / General, Technology & Engineering / Engineering (General), Mathematics / General, Mathematics / Optimization Language EN Average Rating 4 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0387283560 Search Methodologies is a tutorial survey of the methodologies that are at the confluence of several fields: Computer Science, Mathematics and Operations Research. It is a carefully structured and integrated treatment of the major technologies in optimization and search methodology. The book is made up of 18 chapters. The chapter authors are drawn from across Computer Science and Operations Research and include some of the world’s leading authorities in their field. Topical chapters in the book are highlighted in the contents. The result is a major state-of-the-art tutorial text of the main optimization and search methodologies available to researchers, students and practitioners across discipline domains in applied science. It can be used as a textbook or a reference book to learn and apply these methodologies to a wide range of today’s problems. It has been written by some of the world’s most well known authors in the field. More Information
  24. Handbook of Fingerprint Recognition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar Publisher Springer Science & Business Media Published Date 2006-04-06 Page Count 351 Categories Computers / Security / General, Computers / Artificial Intelligence / Computer Vision & Pattern Recognition, Science / Biotechnology, Computers / Artificial Intelligence / General, Computers / Software Development & Engineering / Computer Graphics, Computers / Information Technology, Computers / Optical Data Processing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0387215875 Overview Biometric recognition refers to the use of distinctive physiological and behavioral character- tics (e. g. , fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as “Is this person authorized to enter the facility?”, “Is this individual entitled to access the privileged infor- tion?”, and “Did this person previously apply for a job?” are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e. g. , keys) or knowledge- (e. g. , password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e. g. , welfare disbursement, national ID card, issuing of driver’s license) and civilian (e. g. , computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand - ometry are the ones that are most commonly used. Each biometric has its strengths and we- nesses and the choice of a particular biometric typically depends on the requirements of an application. More Information
  25. Computers and Thought /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Computers and Thought by Edward A. Feigenbaum Publisher McGraw-Hill Published Date 1963 Page Count 535 Categories Artificial intelligence Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.