.jpg.7633371fa53fa19028f71f2e3a72fc4e.jpg)
Everything posted by Jessica Brown
-
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education
Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education by Marijana Despotović-Zrakić, Veljko Milutinović, Aleksandar Belić Publisher Information Science Reference Published Date 2014 Page Count 450 Categories Computers / Data Science / General, Computers / Networking / General, Computers / Distributed Systems / General, Computers / Programming / General, Computers / Internet / General, Computers / Human-Computer Interaction (HCI), Computers / Distributed Systems / Cloud Computing, Science / Applied Sciences, Science / Research & Methodology Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1466657847 As information systems used for research and educational purposes have become more complex, there has been an increase in the need for new computing architecture. High performance and cloud computing provide reliable and cost-effective information technology infrastructure that enhances research and educational processes. Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education presents the applications of cloud computing in various settings, such as scientific research, education, e-learning, ubiquitous learning, and social computing. Providing various examples, practical solutions, and applications of high performance and cloud computing; this book is a useful reference for professionals and researchers discovering the applications of information and communication technologies in science and education, as well as scholars seeking insight on how modern technologies support scientific research. More Information
-
Artificial Intelligence
Artificial Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial Intelligence by Patrick Henry Winston Publisher Addison-Wesley Publishing Company Published Date 1992 Page Count 737 Categories Computers / Intelligence (AI) & Semantics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0201533774 This book explains how it is possible for computers to reason and perceive, thus introducing the field called artificial intelligence. From the book, you learn why the field is important, both as a branch of engineering and as a science.If you are a computer scientist or an engineer, you will enjoy the book, because it provides a cornucopia of new ideas for representing knowledge, using knowledge, and building practical systems. If you are a psychologist, biologist, linguist, or philosopher, you will enjoy the book because it provides an exciting computational perspective on the mystery of intelligence.The Knowledge You NeedThis completely rewritten and updated edition of "Artificial Intelligence" reflects the revolutionary progress made since the previous edition was published. Part I is about representing knowledge and about reasoning methods that make use of knowledge. The material covered includes the semantic-net family of representations, describe and match, generate and test, means-ends analysis, problem reduction, basic search, optimal search, adversarial search, rule chaining, the rete algorithm, frame inheritance, topological sorting, constraint propagation, logic, truth maintenance, planning, and cognitive modeling. Part II is about learning, the sine qua non of intelligence. Some methods involve much reasoning; others just extract regularity from data. The material covered includes near-miss analysis, explanation-based learning, knowledge repair, case recording, version-space convergence, identification-tree construction, neural-net training, perceptron convergence, approximation-net construction, and simulated evolution. Part III is about visual perception and language understanding. You learn not only about perception and language, but also about ideas that have been a major source of inspiration for people working in other subfields of artificial intelligence. The material covered includes object identification, stereo vision, shape from shading, a glimpse of modern linguistic theory, and transition-tree methods for building practical natural-language interfaces.Special Features of this Edition Based on extensive teaching experience Semiformal representation and procedure specifications bring the ideas to within a step or two of implementation and highlight unifying themes. Application examples provide a glimpse of the ideas at work in real-world systems. Powerful ideas and principles are identified and emphasized. 0201533774B04062001 More Information
-
The Communication of Hate
The Communication of Hate /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Communication of Hate by Michael Waltman, John Haas Publisher Peter Lang Published Date 2023 Page Count 202 Categories Business & Economics / Marketing / General, Business & Economics / Public Relations, Computers / General, Computers / Online Services, Juvenile Nonfiction / Social Science / General, Language Arts & Disciplines / Communication Studies, Language Arts & Disciplines / Linguistics / General, Language Arts & Disciplines / Library & Information Science / General, Political Science / General, Social Science / General, Social Science / Sociology / General, Social Science / Discrimination, Social Science / Violence in Society Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1636674372 The book was awarded the 2011 NCA Franklyn S. Haiman Award for Distinguished Scholarship in Freedom of Expression. This book sets out to explore how hate comes alive in language and actions by examining the nature and persuasive functions of hate in American society. Hate speech may be used for many purposes and have different intended consequences. It may be directed to intimidate an out-group, or to influence the behavior of in-group members. But how does this language function? What does it accomplish? The answers to these questions are addressed by an examination of the communicative messages produced by those with hateful minds. Beginning with an examination of the organized hate movement, the book provides a critique of racist discourse used to recruit and socialize new members, construct enemies, promote valued identities, and encourage ethnoviolence. The book also examines the strategic manipulation of hatred in our everyday lives by politicians, political operatives, and media personalities. Providing a comprehensive overview of hate speech, the book ends by describing the desirable features of an anti-hate discourse that promotes respect for social differences. More Information
-
Introduction to Evolutionary Computing
Introduction to Evolutionary Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Introduction to Evolutionary Computing by A.E. Eiben, J.E. Smith Publisher Springer Science & Business Media Published Date 2007-08-06 Page Count 300 Categories Computers / Computer Science, Computers / Intelligence (AI) & Semantics, Computers / Information Technology Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 3540401849 Evolutionary Computing is the collective name for a range of problem-solving techniques based on principles of biological evolution, such as natural selection and genetic inheritance. These techniques are being increasingly widely applied to a variety of problems, ranging from practical applications in industry and commerce to leading-edge scientific research. This book presents the first complete overview of this exciting field aimed directly at lecturers and graduate and undergraduate students. It is also meant for those who wish to apply evolutionary computing to a particular problem or within a given application area. To this group the book is valuable because it presents EC as something to be used rather than just studied. Last, but not least, this book contains quick-reference information on the current state-of-the-art in a wide range of related topics, so it is of interest not just to evolutionary computing specialists but to researchers working in other fields. More Information
-
Gödel, Escher, Bach - An Eternal Golden Braid
Gödel, Escher, Bach /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Gödel, Escher, Bach An Eternal Golden Braid by Douglas R. Hofstadter Publisher Penguin Books Published Date 1980 Page Count 777 Categories Artificial intelligence Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0140055797 No description available. More Information
-
Electronic Brains - Stories from the Dawn of the Computer Age
Electronic Brains /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Electronic Brains Stories from the Dawn of the Computer Age by Mike Hally Publisher Granta Published Date 2005 Page Count 274 Categories Computers / Computer Science, Computers / History, History / General, Science / General, Technology & Engineering / History Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1862076634 By the 1960s, IBM had beaten all rivals and dominated the world computer market. But IBM came late to the race. From the 1930s to the 1960s, small, independent teams on four continents worked on the development of the first modern computers- practical, electronic, multi-purpose, digital machines with memory for data and programs. From interviews with surviving members of those original teams, the author builds up a picture of the eccentric men and women who laid the foundations for the computerised world we now live in, recreating the atmosphere of those early days. Some of the early projects, such as LEO, the Lyons Electronic Office, developed by the catering company J Lyons and Co in London in the 1940s, are now famous, others, such as the ABC, built in the basement of Iowa State College and abandoned when war broke out, and the RAND 409, constructed in a barn in Connecticut under the watchful eye of a stuffed moose, almost unknown. came and went in the years before IBM ruled the world, including the Phillips Hydraulic Economics Computer, or MONIAC, which perfectly demonstrated the workings of the economy by way of coloured water flowing through plastic tubes and the UNIVAC, which became a household name when, live on television, it correctly predicted the results of the 1952 US presidential election. More Information
-
Introductory Signal Processing
Introductory Signal Processing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Introductory Signal Processing by Roland Priemer Publisher World Scientific Publishing Company Published Date 1990-11-29 Page Count 752 Categories Technology & Engineering / General, Computers / Computer Science, Technology & Engineering / Engineering (General) Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9813103752 A valuable introduction to the fundamentals of continuous and discrete time signal processing, this book is intended for the reader with little or no background in this subject. The emphasis is on development from basic principles. With this book the reader can become knowledgeable about both the theoretical and practical aspects of digital signal processing.Some special features of this book are: (1) gradual and step-by-step development of the mathematics for signal processing, (2) numerous examples and homework problems, (3) evolutionary development of Fourier series, Discrete Fourier Transform, Fourier Transform, Laplace Transform, and Z-Transform, (4) emphasis on the relationship between continuous and discrete time signal processing, (5) many examples of using the computer for applying the theory, (6) computer based assignments to gain practical insight, (7) a set of computer programs to aid the reader in applying the theory. More Information
-
Artificial General Intelligence
Artificial General Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Artificial General Intelligence by Ben Goertzel, Cassio Pennachin Publisher Springer Science & Business Media Published Date 2007-01-17 Page Count 509 Categories Computers / Artificial Intelligence / General, Computers / Machine Theory, Technology & Engineering / Automation, Computers / Computer Simulation, Philosophy / Logic, Computers / Information Technology, Computers / Computer Science Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540686770 “Only a small community has concentratedon general intelligence. No one has tried to make a thinking machine . . . The bottom line is that we really haven’t progressed too far toward a truly intelligent machine. We have collections of dumb specialists in small domains; the true majesty of general intelligence still awaits our attack. . . . We have got to get back to the deepest questions of AI and general intelligence. . . ” –MarvinMinsky as interviewed in Hal’s Legacy, edited by David Stork, 2000. Our goal in creating this edited volume has been to ?ll an apparent gap in the scienti?c literature, by providing a coherent presentation of a body of contemporary research that, in spite of its integral importance, has hitherto kept a very low pro?le within the scienti?c and intellectual community. This body of work has not been given a name before; in this book we christen it “Arti?cial General Intelligence” (AGI). What distinguishes AGI work from run-of-the-mill “arti?cial intelligence” research is that it is explicitly focused on engineering general intelligence in the short term. We have been active researchers in the AGI ?eld for many years, and it has been a pleasure to gather together papers from our colleagues working on related ideas from their own perspectives. In the Introduction we give a conceptual overview of the AGI ?eld, and also summarize and interrelate the key ideas of the papers in the subsequent chapters. More Information
-
The Oxford Guide to Practical Lexicography
The Oxford Guide to Practical Lexicography /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Oxford Guide to Practical Lexicography by B. T. Sue Atkins, Michael Rundell Publisher OUP Oxford Published Date 2008-06-19 Page Count 540 Categories Computers / Artificial Intelligence / Natural Language Processing, Foreign Language Study / English as a Second Language, Language Arts & Disciplines / Linguistics / General, Language Arts & Disciplines / Translating & Interpreting, Language Arts & Disciplines / Lexicography Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0199277710 This is a down-to-earth, 'how to do it' textbook on the making of dictionaries. Written by professional lexicographers with over seventy years' experience between them, the book presents a step-by-step course for the training of lexicographers in all settings, including publishing houses, colleges, and universities world-wide, and for the teaching of lexicography as an academic discipline. It takes readers through the processes of designing, collecting, and annotating a corpus of texts; shows how to analyse the data in order to extract the relevant information; and demonstrates how these findings are drawn together in the semantic, grammatical, and pedagogic components that make up an entry. The authors explain the relevance and application of recent linguistic theories, such as prototype theory and frame semantics, and describe the role of software in the manipulation of data and the compilation of entries. They provide practical exercises at every stage. The Oxford Guide to Practical Lexicography draws on materials developed by the authors over more than twenty years of teaching courses for publishing houses and universities in the US, Japan, Hong Kong and China, South Africa, Australia, the UK, and Europe. It will be welcomed everywhere by lexicographers, teachers of lexicography, and their students. It is also fascinating reading for all those interested in discovering how dictionaries are made. More Information
-
Digital Design and Computer Architecture, RISC-V Edition - RISC-V Edition
Digital Design and Computer Architecture, RISC-V Edition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Digital Design and Computer Architecture, RISC-V Edition RISC-V Edition by Sarah Harris, David Harris Publisher Elsevier Science Published Date 2021-10-08 Page Count 592 Categories Computers / Logic Design, Computers / Computer Architecture, Computers / Computer Engineering, Computers / General, Computers / Computer Science Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0128200642 The newest addition to the Harris and Harris family of Digital Design and Computer Architecture books, this RISC-V Edition covers the fundamentals of digital logic design and reinforces logic concepts through the design of a RISC-V microprocessor. Combining an engaging and humorous writing style with an updated and hands-on approach to digital design, this book takes the reader from the fundamentals of digital logic to the actual design of a processor. By the end of this book, readers will be able to build their own RISC-V microprocessor and will have a top-to-bottom understanding of how it works. Beginning with digital logic gates and progressing to the design of combinational and sequential circuits, this book uses these fundamental building blocks as the basis for designing a RISC-V processor. SystemVerilog and VHDL are integrated throughout the text in examples illustrating the methods and techniques for CAD-based circuit design. The companion website includes a chapter on I/O systems with practical examples that show how to use SparkFun's RED-V RedBoard to communicate with peripheral devices such as LCDs, Bluetooth radios, and motors. This book will be a valuable resource for students taking a course that combines digital logic and computer architecture or students taking a two-quarter sequence in digital logic and computer organization/architecture.? More Information
-
Graphic Icons - Visionaries who Shaped Modern Graphic Design
Graphic Icons /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Graphic Icons Visionaries who Shaped Modern Graphic Design by John Clifford Publisher Pearson Education Published Date 2014 Page Count 239 Categories Art / General, Computers / Software Development & Engineering / Computer Graphics, Computers / Desktop Applications / Desktop Publishing, Computers / Design, Graphics & Media / Graphics Tools, Design / Graphic Arts / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0321887204 Annotation div style="color: rgb(0, 0, 0); font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: no≠ white-space: normal; word-spacing: 0px; background-color: rgb(255, 255, 255);" Who are history's most influential graphic designers? In this fun, fast-paced introduction to the most iconic designers of our time, author John Clifford takes you on a visual history tour that's packed with the posters, ads, logos, typefaces, covers, and multimedia work that have made these designers great. You'll find examples of landmark work by such industry luminaries as El Lissitzky, Alexander Rodchenko, A.M. Cassandre, Alvin Lustig, Cipe Pineles, Paul Rand, Saul Bass, Milton Glaser, Wim Crouwel, Stefan Sagmeister, John Maeda, Paula Scher, and more. Who coined the term graphic design? Who turned film titles into an art? Who pioneered information design? Who was the first female art director of a mass-market American magazine? In Graphic Icons: Visionaries Who Shaped Modern Graphic Design, you start with the who and quickly learn the what, when, and why behind graphic design's most important breakthroughs and the impact their creators had, and continue to have, on the world we live in. div style="color: rgb(0, 0, 0); font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: start; text-indent: 0px; text-transform: no≠ white-space: normal; word-spacing: 0px; background-color: rgb(255, 255, 255);"Your favorite designer didn't make the list? Join the conversation at www.graphiciconsbook.com. More Information
-
The Tower of Hanoi – Myths and Maths
The Tower of Hanoi – Myths and Maths /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Tower of Hanoi – Myths and Maths by Andreas M. Hinz, Sandi Klavžar, Uroš Milutinović, Ciril Petr Publisher Springer Science & Business Media Published Date 2013-01-31 Page Count 335 Categories Mathematics / General, Mathematics / History & Philosophy, Mathematics / Mathematical Analysis, Mathematics / Combinatorics, Mathematics / Game Theory, Computers / Programming / Algorithms, Mathematics / Calculus Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3034802374 This is the first comprehensive monograph on the mathematical theory of the solitaire game “The Tower of Hanoi” which was invented in the 19th century by the French number theorist Édouard Lucas. The book comprises a survey of the historical development from the game’s predecessors up to recent research in mathematics and applications in computer science and psychology. Apart from long-standing myths it contains a thorough, largely self-contained presentation of the essential mathematical facts with complete proofs, including also unpublished material. The main objects of research today are the so-called Hanoi graphs and the related Sierpiński graphs. Acknowledging the great popularity of the topic in computer science, algorithms and their correctness proofs form an essential part of the book. In view of the most important practical applications of the Tower of Hanoi and its variants, namely in physics, network theory, and cognitive (neuro)psychology, other related structures and puzzles like, e.g., the “Tower of London”, are addressed. Numerous captivating integer sequences arise along the way, but also many open questions impose themselves. Central among these is the famed Frame-Stewart conjecture. Despite many attempts to decide it and large-scale numerical experiments supporting its truth, it remains unsettled after more than 70 years and thus demonstrates the timeliness of the topic. Enriched with elaborate illustrations, connections to other puzzles and challenges for the reader in the form of (solved) exercises as well as problems for further exploration, this book is enjoyable reading for students, educators, game enthusiasts and researchers alike. More Information
-
Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Social Media Marketing All-in-One For Dummies by Jan Zimmerman, Deborah Ng Publisher John Wiley & Sons Published Date 2017-04-18 Page Count 752 Categories Business & Economics / E-Commerce / Digital Marketing, Business & Economics / Marketing / General, Computers / Internet / Social Media, Business & Economics / General, Political Science / Public Affairs & Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1119329922 The bestselling social media marketing book Marketing your business through social media isn't an option these days—it's absolutely imperative. In this new edition of the bestselling Social Media Marketing All-in-One For Dummies, you'll get comprehensive, expert guidance on how to use the latest social media platforms to promote your business, reach customers, and thrive in the global marketplace. Social media continues to evolve at breakneck speed, and with the help of this guide, you'll discover how to devise and maintain a successful social media strategy, use the latest tactics for reaching your customers, and utilize data to make adjustments to future campaigns and activities. Plus, you'll find out how to apply the marketing savvy you already have to the social media your prospects are using, helping you to reach—and keep—more customers, make more sales, and boost your bottom line. Includes the latest changes to Facebook, Twitter, Pinterest, LinkedIn, YouTube, and more Offers tips for engaging your community and measuring your efforts Explains how to blend social media with your other online and offline marketing efforts Shows you how to leverage data to learn more about your community Don't get left behind! Let this book help you get the most from every minute and dollar you spend on marketing. More Information
-
Linux System Security - An Administrator's Guide to Open Source Security Tools
Linux System Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux System Security An Administrator's Guide to Open Source Security Tools by Scott Mann, Ellen L. Mitchell Publisher Prentice Hall Professional Published Date 2000 Page Count 564 Categories Computers / Security / Network Security, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Security / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0130158070 -- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.-- New chapter on network sniffers and port scanners used to detect intruders.-- Updated for Redhat 7.2.As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open source version of a popular suite of connectivity tools which allow you to login into remote computers and execute commands on these computers. Open SSH contains encryption capabilities that encrypts all traffic including passwords. More Information
-
Computer Vision
Computer Vision /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Computer Vision by Dana Harry Ballard, Christopher M. Brown Publisher Prentice-Hall Published Date 1982 Page Count 523 Categories Computers / Hardware / Personal Computers / Macintosh, Technology & Engineering / Electrical, Technology & Engineering / Electronics / General, Technology & Engineering / Imaging Systems Language EN Average Rating 2 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0131653164 No description available. More Information
-
Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection
Data Matching /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Data Matching Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection by Peter Christen Publisher Springer Science & Business Media Published Date 2012-07-04 Page Count 272 Categories Computers / Database Administration & Management, Computers / Data Science / Data Analytics, Computers / System Administration / Storage & Retrieval, Computers / Artificial Intelligence / General, Computers / Artificial Intelligence / Computer Vision & Pattern Recognition, Computers / Information Technology, Computers / Optical Data Processing Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 3642311644 Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health informatics, data mining, machine learning, artificial intelligence, database management, and digital libraries, significant advances have been achieved over the last decade in all aspects of the data matching process, especially on how to improve the accuracy of data matching, and its scalability to large databases. Peter Christen’s book is divided into three parts: Part I, “Overview”, introduces the subject by presenting several sample applications and their special challenges, as well as a general overview of a generic data matching process. Part II, “Steps of the Data Matching Process”, then details its main steps like pre-processing, indexing, field and record comparison, classification, and quality evaluation. Lastly, part III, “Further Topics”, deals with specific aspects like privacy, real-time matching, or matching unstructured data. Finally, it briefly describes the main features of many research and open source systems available today. By providing the reader with a broad range of data matching concepts and techniques and touching on all aspects of the data matching process, this book helps researchers as well as students specializing in data quality or data matching aspects to familiarize themselves with recent research advances and to identify open research challenges in the area of data matching. To this end, each chapter of the book includes a final section that provides pointers to further background and research material. Practitioners will better understand the current state of the art in data matching as well as the internal workings and limitations of current systems. Especially, they will learn that it is often not feasible to simply implement an existing off-the-shelf data matching system without substantial adaption and customization. Such practical considerations are discussed for each of the major steps in the data matching process. More Information
-
They'd Rather be Right
They'd Rather be Right /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } They'd Rather be Right by Mark Clifton, Frank Riley Publisher Doubleday Published Date 1981 Page Count 181 Categories Science fiction, American Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A Two professors and their graduate-student lab assistant are unlikely fugitives from the law, hiding out on skid-row with their invention, the world's first super-computer, dubbed Bossy. The government and the public want Bossy destroyed, but the scientists want Bossy to save human-kind from itself. And the two professors don't know that Joe Carter, their assistant, is a telepath, and the real creator of Bossy. More Information
-
Religion Online - Finding Faith on the Internet
Religion Online /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Religion Online Finding Faith on the Internet by Lorne L. Dawson, Douglas E. Cowan Publisher Routledge Published Date 2013-04-15 Page Count 288 Categories Computers / Internet / General, Religion / Reference, Religion / Faith, Religion / Religion & Science, Social Science / Anthropology / Cultural & Social, Social Science / Media Studies Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1135878730 Religion Online provides an accessible and comprehensive introduction to this burgeoning new religious reality, from cyberpilgrimages to neo-pagan chatroom communities. A substantial introduction by the editors presenting the main themes and issues is followed by sixteen chapters addressing core issues of concern such as youth, religion and the internet, new religious movements and recruitment, propaganda and the countercult, and religious tradition and innovation. More Information
-
Network Security Assessment - Know Your Network
Network Security Assessment /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Network Security Assessment Know Your Network by Chris McNab Publisher "O'Reilly Media, Inc." Published Date 2016-12-06 Page Count 494 Categories Computers / Networking / General, Computers / Networking / Local Area Networks (LANs), Computers / Networking / Network Protocols, Computers / Security / General, Computers / Networking / Intranets & Extranets Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491911069 How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing attacker techniques, along with effective countermeasures you can use immediately. Learn how to effectively test system components, including: Common services such as SSH, FTP, Kerberos, SNMP, and LDAPMicrosoft services, including NetBIOS, SMB, RPC, and RDPSMTP, POP3, and IMAP email servicesIPsec and PPTP services that provide secure network accessTLS protocols and features providing transport securityWeb server software, including Microsoft IIS, Apache, and NginxFrameworks including Rails, Django, Microsoft ASP.NET, and PHPDatabase servers, storage protocols, and distributed key-value stores More Information
-
Alice Survey Service
Alice Survey Service /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Alice Survey Service by Chanh-Phuc Ngo Publisher California State University, Los Angeles Published Date 2021 Page Count 59 Categories A Library of Services Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9798534662290 Alice is an abbreviation for A Library of Services. Alice provides open-source, reusable, and standalone services as a library, including user management, survey, rubric, email, and more. However, now, only authentication, rubric, and survey services are available in Alice. This project mainly focuses on designing and implementing the survey services.A survey is a tool or method to collect information from individuals' opinions through their responses. Surveys help to gather targeted results that support drawing significant and essential decisions. In Alice Survey Service, all survey features can conveniently interact with other services, and authenticated users can manage statistics and reports by converting responses' data into charts and tables.Moreover, one of the main essential features of Alice Survey Service is response grouping, which most commercial survey services like SurveyMonkey and Qualtrics do not even provide. This feature allows users to group responses from a survey to provide visualizable analytical data through the tabulated and charted statistics. More Information
-
Mastering CloudForms Automation - An Essential Guide for Cloud Administrators
Mastering CloudForms Automation /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Mastering CloudForms Automation An Essential Guide for Cloud Administrators by Peter McGowan Publisher "O'Reilly Media, Inc." Published Date 2016-08-22 Page Count 432 Categories Computers / Computer Architecture, Computers / System Administration / Email Servers, Computers / System Administration / Storage & Retrieval, Computers / Distributed Systems / General, Computers / System Administration / General, Computers / System Administration / Linux & UNIX Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491957204 Learn how to work with the Automate feature of CloudForms, the powerful Red Hat cloud management platform that lets you administer your virtual infrastructure, including hybrid public and private clouds. This practical hands-on introduction shows you how to increase your operational efficiency by automating day-to-day tasks that now require manual input. Throughout the book, author Peter McGowan provides a combination of theoretical information and practical coding examples to help you learn the Automate object model. With this CloudForms feature, you can create auto-scalable cloud applications, eliminate manual decisions and operations when provisioning virtual machines and cloud instances, and manage your complete virtual machine lifecycle. In six parts, this book helps you: Learn the objects and concepts for developing automation scripts with CloudForms AutomateCustomize the steps and workflows involved in provisioning virtual machinesCreate and use service catalogs, items, dialogs, objects, bundles, and hierarchiesUse CloudForm’s updated workflow to retire and delete virtual machines and servicesOrchestrate and coordinate with external services as part of a workflowExplore distributed automation processing as well as argument passing and handling More Information
-
Nordic Public Sector Cloud Computing - a Discussion Paper
Nordic Public Sector Cloud Computing - a Discussion Paper /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Nordic Public Sector Cloud Computing - a Discussion Paper by Nordic Council of Ministers, Nordiska Ministerrådet Publisher Nordic Council of Ministers Published Date 2012-01-19 Page Count 55 Categories Cloud computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9289322861 Cloud computing is widely recognised as a mean for bringing cost savings and better utilisation of resources to the IT departments and their limited budgets. Cloud computing, where IT is delivered as an on-demand pay-per-use service, is rapidly evolving from a hype to a serious alternative to traditional IT procurement. This development is vastly driven by big international players. If the Nordic region is to influence and gain from this development it is essential that the Nordic governments act now. This report sets the scene for a common understanding of the notion of cloud computing across the Nordic region. The report offers a list of recommendations for key action points where cooperation across the Nordic region will be beneficial in order to establish the Nordic region as a driving force for cloud computing in the public sector. More Information
-
Arista Warrior
Arista Warrior /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Arista Warrior by Gary Donahue Publisher "O'Reilly Media, Inc." Published Date 2012-10-17 Page Count 400 Categories Computers / Computer Science, Computers / Networking / General, Computers / Networking / Local Area Networks (LANs), Computers / Networking / Network Protocols, Computers / Networking / Vendor Specific, Computers / Distributed Systems / General, Computers / Networking / Intranets & Extranets Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1449314538 Though Arista Networks is a relative newcomer in the data center and cloud networking markets, the company has already had considerable success. In this book, renowned consultant and technical author Gary Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s lineup of hardware, and explains why its network switches and Extensible Operating System (EOS) are so effective. Anyone with a CCNA or equivalent knowledge will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Is Arista right for your data center? Pick up this guide and find out. Topic highlights include: SysDB: the EOS system database that holds state, statuses, and variables Multichassis Link Aggregation (MLAG): for linking a port-channel to multiple switches instead of just one Latency Analyzer (LANZ): the interface-buffer troubleshooting tool with a reporting granularity of one millisecond VM Tracer: for adding, changing, and removing VLANs without human interaction Zero-Touch Provisioning (ZTP): for remote switch configuration Hardware advantages: including merchant silicon, low-latency networking, and power consumption Gotchas: issues with Arista switches or systems More Information
-
Discover Linux
Discover Linux /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Discover Linux by Steve Oualline Publisher IDG Books Worldwide Published Date 1997 Page Count 438 Categories Computers / Operating Systems / Linux Language EN Average Rating 3 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0764531050 Users who know UNIX and want to learn and use LINUX will find what they need to know in this title. Different types of audiences include programmers, network administrators, people who need an easy Internet/Web connection, users who need a secure firewall machine, and game players. The CD-ROM includes the popular and easy-to-install RedHat LINUX 4.1 distribution. More Information
-
Hacking with Kali Linux - A Step by Step Guide to Learn the Basics of Linux Penetration : What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security : Tools Explanation Included
Hacking with Kali Linux /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Hacking with Kali Linux A Step by Step Guide to Learn the Basics of Linux Penetration : What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security : Tools Explanation Included by Axel Ross Publisher Axel Ross Published Date 2022 Page Count N/A Categories Uncategorized Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9798201625429 Do you want to find out how hackers move around the net?Do you want to become an ethical or unethical hacker? What is your purpose? Modern-day hacking has become more sophisticated than ever. Hacktivists groups, ransomware, and highly classified document releases are a daily problem. In modern times, the ethical hackers are needed more than ever to protect and prevent hack attacks. The information available to everyone makes it all the easier for hack attacks, but it makes protection available as well. Hacking is not always black and white, and there are different types of hackers and types of hacking. The major types of hackers are divided between ethical, unethical, and somewhere in between. Kali Linux comes with just about every tool pre-installed that can be used for any of the above purposes. It is for this reason that Security Auditors, Forensics Investigators, Penetration Testers, and Researchers prefer it. This book covers topical issues like wireless network attacks, cyber-attacks, and penetration testing, among others. It, therefore, means that you are now in an excellent position to discern network attack mechanisms being perpetrated in the real world and recommend appropriate remedial measures. This guide will focus on the following: How To Install The Kali LinuxSetting Up Your Hacking LabEssential Linux Terminal CommandsWeb-Based ExploitationTypes of Penetration TestingHacking Wifi PasswordsNetworking To Achieve TargetsThe Effects Everyone Suffers FromAdvanced kali Linux conceptsPreventing Cyber AttacksAnd more! Whatever your purpose, you should know that the world of hackers is much more fascinating than you think, and this guide is a well condensed resource of all the news and techniques you need to achieve your goal. Leave ignorance to the foolish, embrace knowledge. Buy this guide now! More Information