Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Everything posted by Jessica Brown

  1. Network Science /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Network Science Theory and Applications by Ted G. Lewis Publisher Wiley Published Date 2008-04-21 Page Count 550 Categories Computers / Networking / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 047040079X A comprehensive look at the emerging science of networksNetwork science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people.This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing.The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover:OriginsGraphsRegular NetworksRandom NetworksSmall-World NetworksScale-Free NetworksEmergenceEpidemicsSynchronyInfluence NetworksVulnerabilityNet GainBiologyThis book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study. More Information
  2. LikeWar /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } LikeWar The Weaponization of Social Media by Peter Warren Singer, Emerson T. Brooking Publisher Mariner Books, Houghton Mifflin Harcourt Published Date 2019 Page Count 432 Categories Computers / Security / General, Computers / Internet / Social Media, Philosophy / Political, Political Science / Security (National & International), Political Science / Terrorism, Political Science / Censorship, Political Science / World / General, Political Science / Propaganda, Political Science / Political Process / Media & Internet, Political Science / Public Policy / Military Policy, Science / History, Science / Philosophy & Social Aspects, Social Science / Social Work, Social Science / Future Studies, Social Science / Media Studies, Technology & Engineering / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0358108470 Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world. More Information
  3. Man and Superman /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Man and Superman Large Print by George Bernard Shaw Publisher CreateSpace Independent Publishing Platform Published Date 2018-07-26 Page Count 214 Categories Computers / General, Drama / European / English, Irish, Scottish, Welsh, Education / Computers & Technology, Performing Arts / Acting & Auditioning, Philosophy / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1724267698 George Bernard Shaw When the brains of the average reader become tangled up in the mazes of Mr. Shaw's latest offering, "Man and Superman," he will wonder, long before its close, whether he, or the author, is crazy. That is, if he takes the book seriously. If he does not, he will enjoy himself thoroughly, but will have failed to appreciate the spirit and intention of the work's creator. We are delighted to publish this classic book as part of our extensive Classic Library collection. Many of the books in our collection have been out of print for decades, and therefore have not been accessible to the general public. The aim of our publishing program is to facilitate rapid access to this vast reservoir of literature, and our view is that this is a significant literary work, which deserves to be brought back into print after many decades. The contents of the vast majority of titles in the Classic Library have been scanned from the original works. To ensure a high quality product, each title has been meticulously hand curated by our staff. Our philosophy has been guided by a desire to provide the reader with a book that is as close as possible to ownership of the original work. We hope that you will enjoy this wonderful classic work, and that for you it becomes an enriching experience. More Information
  4. Computer Organization and Architecture /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Computer Organization and Architecture Designing for Performance by William Stallings, R. Mohan Publisher Pearson Published Date 2013 Page Count 786 Categories Computers / General, Computers / Computer Architecture Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0273769197 For undergraduates and professionals in computer science, computer engineering, and electrical engineering courses. Learn the fundamentals of processor and computer design from the newest edition of this award-winning text. Four-time winner of the best Computer Science and Engineering textbook of the year award from the Textbook and Academic Authors Association, Computer Organization and Architecture: Designing for Performance provides a thorough discussion of the fundamentals of computer organization and architecture, covering not just processor design, but memory, I/O, and parallel systems.Coverage is supported by a wealth of concrete examples emphasizing modern systems. More Information
  5. Newton's Telecom Dictionary /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Newton's Telecom Dictionary by Harry Newton Publisher Flatiron Books Published Date 2009 Page Count 1273 Categories Computers / General, Computers / Computer Literacy, Computers / Internet / General, Reference / Dictionaries, Technology & Engineering / Reference, Technology & Engineering / Telecommunications Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0979387337 Telecommunications, the internet, networking, information technologies, everything voice, date and video-moving still. -- Cover. More Information
  6. Linear Models and Generalizations /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linear Models and Generalizations Least Squares and Alternatives by C. Radhakrishna Rao, Helge Toutenburg, Shalabh, Christian Heumann Publisher Springer Science & Business Media Published Date 2007-10-15 Page Count 572 Categories Mathematics / Probability & Statistics / General, Business & Economics / Economics / Theory, Computers / Mathematical & Statistical Software, Business & Economics / Operations Research, Mathematics / Probability & Statistics / Stochastic Processes, Mathematics / Discrete Mathematics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3540742271 Thebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account of the theory and applications of linear models. The book can be used as a text for courses in statistics at the graduate level and as an accompanying text for courses in other areas. Some of the highlights in this book are as follows. A relatively extensive chapter on matrix theory (Appendix A) provides the necessary tools for proving theorems discussed in the text and o?ers a selectionofclassicalandmodernalgebraicresultsthatareusefulinresearch work in econometrics, engineering, and optimization theory. The matrix theory of the last ten years has produced a series of fundamental results aboutthe de?niteness ofmatrices,especially forthe di?erences ofmatrices, which enable superiority comparisons of two biased estimates to be made for the ?rst time. We have attempted to provide a uni?ed theory of inference from linear models with minimal assumptions. Besides the usual least-squares theory, alternative methods of estimation and testing based on convex loss fu- tions and general estimating equations are discussed. Special emphasis is given to sensitivity analysis and model selection. A special chapter is devoted to the analysis of categorical data based on logit, loglinear, and logistic regression models. The material covered, theoretical discussion, and a variety of practical applications will be useful not only to students but also to researchers and consultants in statistics. More Information
  7. Jessica Brown posted a post in a topic in Computers
    Man And Superman /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Man And Superman by George Bernard Shaw Publisher CreateSpace Independent Publishing Platform Published Date 2018-06-11 Page Count 444 Categories Computers / General, Drama / European / English, Irish, Scottish, Welsh, Education / Computers & Technology, Performing Arts / Acting & Auditioning, Philosophy / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1720991979 Man And Superman A Comedy and a Philosophy by George Bernard Shaw After the death of her father, Ann Whitefield becomes the joint ward of two men: the respectable Roebuck Ramsden and John Tanner, author of 'The Revolutionist's Handbook'. Believing marriage would prevent him from achieving his higher intellectual and political ambitions, Tanner is horrified to discover that Ann intends to marry him, and flees to Spain with the determined young woman in hot pursuit. The chase even leads them to the underworld, where the characters' alter egos discuss questions of human nature and philosophy in a lively debate in a scene often performed separately as 'Don Juan in Hell'. In Man and Superman, Shaw combined seriousness with comedy to create a satirical and buoyant exposé of the eternal struggle between the sexes. We are delighted to publish this classic book as part of our extensive Classic Library collection. Many of the books in our collection have been out of print for decades, and therefore have not been accessible to the general public. The aim of our publishing program is to facilitate rapid access to this vast reservoir of literature, and our view is that this is a significant literary work, which deserves to be brought back into print after many decades. The contents of the vast majority of titles in the Classic Library have been scanned from the original works. To ensure a high quality product, each title has been meticulously hand curated by our staff. Our philosophy has been guided by a desire to provide the reader with a book that is as close as possible to ownership of the original work. We hope that you will enjoy this wonderful classic work, and that for you it becomes an enriching experience. More Information
  8. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C Foster Publisher Elsevier Published Date 2005-04-26 Page Count 700 Categories Computers / Security / General Language EN Average Rating 4.5 (based on 3 ratings) Maturity Rating No Mature Content Detected ISBN 0080489729 The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel.5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks. More Information
  9. Jessica Brown posted a post in a topic in Computers
    Ethereum For Dummies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Ethereum For Dummies by Michael G. Solomon Publisher John Wiley & Sons Published Date 2019-03-28 Page Count 272 Categories Computers / Business & Productivity Software / Databases, Business & Economics / General, Political Science / Public Affairs & Administration Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1119474116 Dive into a secure future Professionals look to Ethereum as a blockchain-based platform to develop safe applications and conduct secure transactions. It takes a knowledgeable guiding hand to understand how Ethereum works and what it does — and Ethereum For Dummies provides that guidance. Written by one of the leading voices in the blockchain community and best selling author of Blockchain For Dummies, this book demystifies the workings of Ethereum and shows how it can enhance security, transactions, and investments. As an emerging application of blockchain technology, Ethereum attracts a wide swath of professionals ranging from financial pros who see it as a way to enhance their business, security analysts who want to conduct secure transactions, programmers who build apps that employ the Ethereum blockchain, or investors interested in cashing in on the rise of cryptocurrency. Ethereum For Dummies offers a starting point to all members of this audience as it provides easy-to-understand explanation of the tools and techniques of using Ethereum. Understand the fundamentals of Ethereum Build smart contracts Create decentralized applications Examine public and private chains If you need to get a grip on one of the biggest applications of blockchain technology, this book makes it easier. More Information
  10. Fundamentals of Information Systems Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Fundamentals of Information Systems Security by David Kim, Michael G. Solomon Publisher Jones & Bartlett Publishers Published Date 2016-10-15 Page Count 548 Categories Business & Economics / General, Business & Economics / Information Management, Computers / Security / Network Security, Computers / Security / General, Medical / Physician & Patient Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 128411645X Bundles and Virtual Lab Access are available on the Ordering Options tab. For questions about this title, please contact ISSAsupport@jblearning.com. Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security. -Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam -Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2 -New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker -Addresses data breach and data breach incident response planning -Introduces recent "Internet of Things" risk threats and privacy issues -Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more: http: //www.issaseries.com/ More Information
  11. The Science of Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Science of Computing Shaping a Discipline by Matti Tedre Publisher CRC Press LLC Published Date 2017-07-27 Page Count 290 Categories Computers / Programming / Games, Computers / Computer Science, Computers / Information Theory, Mathematics / Recreations & Games Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1138413925 The identity of computing has been fiercely debated throughout its short history. Why is it still so hard to define computing as an academic discipline? Is computing a scientific, mathematical, or engineering discipline? By describing the mathematical, engineering, and scientific traditions of computing, The Science of Computing: Shaping a Discipline presents a rich picture of computing from the viewpoints of the fields champions. The book helps readers understand the debates about computing as a discipline. It explains the context of computing's central debates and portrays a broad perspective of the discipline. The book first looks at computing as a formal, theoretical discipline that is in many ways similar to mathematics, yet different in crucial ways. It traces a number of discussions about the theoretical nature of computing from the fields intellectual origins in mathematical logic to modern views of the role of theory in computing. The book then explores the debates about computing as an engineering discipline, from the central technical innovations to the birth of the modern technical paradigm of computing to computing's arrival as a new technical profession to software engineering gradually becoming an academic discipline. It presents arguments for and against the view of computing as engineering within the context of software production and analyzes the clash between the theoretical and practical mindsets. The book concludes with the view of computing as a science in its own right not just as a tool for other sciences. It covers the early identity debates of computing, various views of computing as a science, and some famous characterizations of the discipline. It also addresses the experimental computer science debate, the view of computing as a natural science, and the algorithmization of sciences. More Information
  12. Aspects and Applications of the Random Walk /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Aspects and Applications of the Random Walk by George Herbert Weiss Publisher North-Holland Published Date 1994 Page Count 361 Categories Computers / General, Mathematics / Probability & Statistics / General, Mathematics / Probability & Statistics / Stochastic Processes, Science / Physics / General, Science / Mechanics / Thermodynamics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0444816062 Paperback. Both the formalism and many of the attendant ideas related to the random walk lie at the core of a significant fraction of contemporary research in statistical physics. In the language of physics the random walk can be described as a microscopic model for transport processes which have some element of randomness. The starting point of nearly all analyses of transport in disordered media is to be found in one or another type of random walk model. Mathematical formalism based on the theory of random walks is not only pervasive in a number of areas of physics, but also finds application in many areas of chemistry. The random walk has also been applied to the study of a number of biological phenomena.Despite the obvious importance of random walks in these and other applications there are few books devoted to the subject. This is therefore a timely introduction to the subject which will be welcomed by students and more senior researchers who have More Information
  13. Facebook Marketing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Facebook Marketing An Hour a Day by Chris Treadaway, Mari Smith Publisher John Wiley & Sons Published Date 2012-05-08 Page Count 360 Categories Business & Economics / E-Commerce / Digital Marketing, Computers / Computer Science, Computers / Internet / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1118147839 The bestselling Sybex guide to marketing on Facebook, now fully updated As the second most-visited site on the web, Facebook offers myriad marketing opportunities and a host of new tools. This bestselling guide is now completely updated to cover all of the latest tools including Deals, sponsored stories, the Send button, and more. It explains how to develop a winning strategy, implement a campaign, measure results, and produce usable reports. Case studies, step-by-step directions, and hands-on tutorials in the popular Hour-a-Day format make this the perfect handbook for maximizing marketing efforts on Facebook. This revised guide fills you in on the latest Facebook conventions, tools, and demographics, and outlines the important strategic considerations for planning a campaign Takes you step by step through crafting an initial Facebook presence, developing an overall marketing strategy, setting goals, defining metrics, developing reports, and integrating your strategy with other marketing activities Covers using features such as events, applications, and pay-per-click advertising Includes case studies and directions for updating, monitoring, and maintaining your campaign This popular guide is packed with up-to-date information to help you develop, implement, measure, and maintain a successful Facebook marketing program. More Information
  14. Flatland /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Flatland A Romance of Many Dimensions by Edwin Abbott Abbott Publisher CreateSpace Independent Publishing Platform Published Date 2016-07-14 Page Count 102 Categories Computers / Software Development & Engineering / Computer Graphics, Literary Collections / General, Mathematics / Geometry / General, Mathematics / Recreations & Games, Photography / Collections, Catalogs, Exhibitions / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1535281952 This masterpiece of science (and mathematical) fiction is a delightfully unique and highly entertaining satire that has charmed readers for more than 100 years. The work of English clergyman, educator and Shakespearean scholar Edwin A. Abbott (1838-1926), it describes the journeys of A. Square, a mathematician and resident of the two-dimensional Flatland, where women-thin, straight lines-are the lowliest of shapes, and where men may have any number of sides, depending on their social status. Through strange occurrences that bring him into contact with a host of geometric forms, Square has adventures in Spaceland (three dimensions), Lineland (one dimension) and Pointland (no dimensions) and ultimately entertains thoughts of visiting a land of four dimensions-a revolutionary idea for which he is returned to his two-dimensional world. Charmingly illustrated by the author, Flatland is not only fascinating reading, it is still a first-rate fictional introduction to the concept of the multiple dimensions of space. "Instructive, entertaining, and stimulating to the imagination." - Mathematics Teacher. More Information
  15. Jessica Brown posted a post in a topic in Computers
    Operating System Concepts /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Operating System Concepts by Abraham Silberschatz, Peter B. Galvin Publisher Addison-Wesley Published Date 1994 Page Count 780 Categories Computers / Operating Systems / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0201504804 The fourth edition of this book has expanded coverage of memory management (modern computer architectures) and file system design and implementation. The book features expanded discussion of parallel, distributed and real-time systems. It now includes a tutorial appendix based on the NACHOS operating system, new material on atomicity and expanded coverage of protection and security. All the hardware issues in this edition are covered in one chapter for ease of understanding. Common operating systems (MS-DOS, OS/2, Macintosh, SunOS 5) are used throughout the book to illustrate concepts and to provide examples of performance characteristics. The coverage of UNIX and the Mach operating system has also been expanded. All the chapters include a summary and exercises. More Information
  16. Convolutional Neural Networks in Visual Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Convolutional Neural Networks in Visual Computing A Concise Guide by Ragav Venkatesan, Baoxin Li Publisher CRC Press Published Date 2018 Page Count 168 Categories Computers / Machine Theory, Computers / Data Science / Neural Networks, Computers / Software Development & Engineering / Systems Analysis & Design, Technology & Engineering / Automation, Technology & Engineering / Electronics / General, Technology & Engineering / Engineering (General), Technology & Engineering / Industrial Engineering Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1498770398 "Cover"--"Half tilte"--"Series title" -- "Title page" -- "Copyright" -- "Dedication" -- "Contents" -- "Preface" -- "Acknowledgments" -- "Authors" -- "Chapter 1: Introduction to Visual Computing" -- " Image Representation Basics" -- "Transform-Domain Representations" -- " Image Histograms" -- " Image Gradients and Edges" -- "Going beyond Image Gradients" -- " Line Detection Using the Hough Transform" -- " Harris Corners" -- "Scale-Invariant Feature Transform" -- " Histogram of Oriented Gradients" -- "Decision-Making in a Hand-Crafted Feature Space" -- "Bayesian Decision-Making" -- "Decision-Making with Linear Decision Boundaries" -- "A Case Study with Deformable Part Models" -- "Migration toward Neural Computer Vision" -- "Summary" -- "References" -- "Chapter 2: Learning As a Regression Problem" -- "Supervised Learning" -- "Linear Models" -- "Least Squares" -- "Maximum-Likelihood Interpretation" -- "Extension to Nonlinear Models" -- "Regularization" -- "Cross-Validation" -- "Gradient Descent" -- "Geometry of Regularization" -- "Nonconvex Error Surfaces" -- "Stochastic, Batch, and Online Gradient Descent" -- "Alternative Update Rules Using Adaptive Learning Rates" -- "Momentum" -- "Summary" -- "References" -- "Chapter 3: Artificial Neural Networks" -- "The Perceptron" -- " Multilayer Neural Networks" -- "The Back-Propagation Algorithm" -- "Improving BP- Based Learning" -- " Activation Functions" -- " Weight Pruning" -- " Batch Normalization" -- "Summary" -- "References" -- "Chapter 4: Convolutional Neural Networks" -- "Convolution and Pooling Layer" -- "Convolutional Neural Networks" -- "Summary" -- "References" -- "Chapter 5: Modern and Novel Usages of CNNs" -- "Pretrained Networks" -- "Generality and Transferability" -- "Using Pretrained Networks for Model Compression" -- "Mentee Networks and FitNets More Information
  17. Everybody Lies /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Everybody Lies Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are by Seth Stephens-Davidowitz Publisher HarperCollins Published Date 2017-05-09 Page Count 352 Categories Social Science / Popular Culture, Business & Economics / Information Management, Computers / Data Science / Data Analytics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0062390856 An Economist Best Book of the Year A PBS NewsHour Book of the Year An Entrepeneur Top Business Book An Amazon Best Book of the Year in Business and Leadership New York Times Bestseller Foreword by Steven Pinker, author of The Better Angels of our Nature Blending the informed analysis of The Signal and the Noise with the instructive iconoclasm of Think Like a Freak, a fascinating, illuminating, and witty look at what the vast amounts of information now instantly available to us reveals about ourselves and our world—provided we ask the right questions. By the end of an average day in the early twenty-first century, human beings searching the internet will amass eight trillion gigabytes of data. This staggering amount of information—unprecedented in history—can tell us a great deal about who we are—the fears, desires, and behaviors that drive us, and the conscious and unconscious decisions we make. From the profound to the mundane, we can gain astonishing knowledge about the human psyche that less than twenty years ago, seemed unfathomable. Everybody Lies offers fascinating, surprising, and sometimes laugh-out-loud insights into everything from economics to ethics to sports to race to sex, gender and more, all drawn from the world of big data. What percentage of white voters didn’t vote for Barack Obama because he’s black? Does where you go to school effect how successful you are in life? Do parents secretly favor boy children over girls? Do violent films affect the crime rate? Can you beat the stock market? How regularly do we lie about our sex lives and who’s more self-conscious about sex, men or women? Investigating these questions and a host of others, Seth Stephens-Davidowitz offers revelations that can help us understand ourselves and our lives better. Drawing on studies and experiments on how we really live and think, he demonstrates in fascinating and often funny ways the extent to which all the world is indeed a lab. With conclusions ranging from strange-but-true to thought-provoking to disturbing, he explores the power of this digital truth serum and its deeper potential—revealing biases deeply embedded within us, information we can use to change our culture, and the questions we’re afraid to ask that might be essential to our health—both emotional and physical. All of us are touched by big data everyday, and its influence is multiplying. Everybody Lies challenges us to think differently about how we see it and the world. More Information
  18. Test Driven Development /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Test Driven Development By Example by Kent Beck Publisher Addison-Wesley Professional Published Date 2022-03-25 Page Count 240 Categories Computers / Software Development & Engineering / General, Computers / Software Development & Engineering / Quality Assurance & Testing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0137585233 Quite simply, test-driven development is meant to eliminate fear in application development. While some fear is healthy (often viewed as a conscience that tells programmers to "be careful!"), the author believes that byproducts of fear include tentative, grumpy, and uncommunicative programmers who are unable to absorb constructive criticism. When programming teams buy into TDD, they immediately see positive results. They eliminate the fear involved in their jobs, and are better equipped to tackle the difficult challenges that face them. TDD eliminates tentative traits, it teaches programmers to communicate, and it encourages team members to seek out criticism However, even the author admits that grumpiness must be worked out individually! In short, the premise behind TDD is that code should be continually tested and refactored. Kent Beck teaches programmers by example, so they can painlessly and dramatically increase the quality of their work. More Information
  19. How to Use Excel® in Analytical Chemistry /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } How to Use Excel® in Analytical Chemistry And in General Scientific Data Analysis by Robert de Levie Publisher Cambridge University Press Published Date 2001-02-05 Page Count 487 Categories Computers / Business & Productivity Software / Spreadsheets, Science / Chemistry / General, Science / Chemistry / Analytic Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0521644844 Because of their intuitive layout, extensive mathematical capabilities, and convenient graphics, spreadsheets provide an easy, straightforward route to scientific computing. This textbook for undergraduate and entry-level graduate chemistry and chemical engineering students uses Excel, the most powerful available spreadsheet, to explore and solve problems in general and chemical data analysis. This is the only up-to-date text on the use of spreadsheets in chemistry. The book discusses topics including statistics, chemical equilibria, pH calculations, titrations, and instrumental methods such as chromatography, spectrometry, and electroanalysis. It contains many examples of data analysis, and uses spreadsheets for numerical simulations, and testing analytical procedures. It also treats modern data analysis methods such as linear and non-linear least squares in great detail, as well as methods based on Fourier transformation. The book shows how matrix methods can be powerful tools in data analysis, and how easily these are implemented on a spreadsheet and describes in detail how to simulate chemical kinetics on a spreadsheet. It also introduces the reader to the use of VBA, the macro language of Microsoft Office, which lets the user import higher-level computer programs into the spreadsheet. More Information
  20. Gamish /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Gamish A Graphic History of Gaming by Edward Ross Publisher Penguin UK Published Date 2020-11-05 Page Count 208 Categories Comics & Graphic Novels / Nonfiction / General, Games & Activities / Video & Mobile, Art / Video Game Art, Computers / History, Computers / Programming / Games, History / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1846149495 *Shortlisted for the British Book Design and Production Award for Graphic Novels* 'A love letter to gaming in all its forms - from board games, to role-play, to virtual reality and video games. For fans of gaming, this is the perfect read. For those new to gaming, it is the perfect introduction' The Scotsman A thrilling illustrated journey through the history of video games and what they really mean to us Pac-Man. Mario. Minecraft. Doom. Ever since he first booted up his brother's dusty old Atari, comic artist Edward Ross has been hooked on video games. Years later, he began to wonder: what makes games so special? Why do we play? And how do games shape the world we live in? This lovingly illustrated book takes us through the history of video games, from the pioneering prototypes of the 1950s to the modern era of blockbuster hits and ingenious indie gems. Exploring the people and politics behind one of the world's most exciting art-forms, Gamish is a love letter to something that has always been more than just a game. More Information
  21. Bitcoin Billionaires /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Bitcoin Billionaires A True Story of Genius, Betrayal, and Redemption by Ben Mezrich Publisher Flatiron Books Published Date 2019-05-21 Page Count 384 Categories Biography & Autobiography / Business, Business & Economics / Bitcoin & Cryptocurrencies, Computers / Electronic Commerce Language EN Average Rating 4.5 (based on 5 ratings) Maturity Rating No Mature Content Detected ISBN 125021775X From Ben Mezrich, the New York Times bestselling author of The Accidental Billionaires and Bringing Down the House, comes Bitcoin Billionaires--the fascinating story of brothers Tyler and Cameron Winklevoss's big bet on crypto-currency and its dazzling pay-off. Ben Mezrich's 2009 bestseller The Accidental Billionaires is the definitive account of Facebook's founding and the basis for the Academy Award–winning film The Social Network. Two of the story's iconic characters are Harvard students Tyler and Cameron Winklevoss: identical twins, Olympic rowers, and foils to Mark Zuckerberg. Bitcoin Billionaires is the story of the brothers’ redemption and revenge in the wake of their epic legal battle with Facebook. Planning to start careers as venture capitalists, the brothers quickly discover that no one will take their money after their fight with Zuckerberg. While nursing their wounds in Ibiza, they accidentally run into an eccentric character who tells them about a brand-new idea: cryptocurrency. Immersing themselves in what is then an obscure and sometimes sinister world, they begin to realize “crypto” is, in their own words, "either the next big thing or total bulls--t." There’s nothing left to do but make a bet. From the Silk Road to the halls of the Securities and Exchange Commission, Bitcoin Billionaires will take us on a wild and surprising ride while illuminating a tantalizing economic future. On November 26, 2017, the Winklevoss brothers became the first bitcoin billionaires. Here’s the story of how they got there—as only Ben Mezrich could tell it. More Information
  22. Real-world Linux Security /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Real-world Linux Security Intrusion, Prevention, Detection, and Recovery by Bob Toxen Publisher Prentice Hall Professional Published Date 2001 Page Count 694 Categories Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Security / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0130281875 Cracker attacks are costing leading e-Businesses millions -- and spotlighting the dangers intruders pose to every participant in the new dot-com economy. If you rely on Linux, this is your systematic, comprehensive guide to protecting yourself. Security guru Bob Toxen uses real-world case studies from his own consulting career to show exactly how network and Internet security breaches can happen, what they look like when they do happen, and what you must do now to prevent them. The book is organized into four sections: securing your system, preparing for an intrusion, detecting an intrusion, and recovering from an intrusion. Toxen even provides at-a-glance icons and tables rating the severity and likelihood of each type of attack. Along the way, you'll learn how to configure systems so they alter themselves to lock out a cracker -- and notify the sysadmin immediately -- at the first sign of attack. You'll discover virtually cracker-proof techniques for protecting credit card databases, even if your web server and network are compromised. Toxen also presents 100+ pages of techniques for ensuring that, if a break-in does occur, damage will be minimal and a full recovery can happen fast. The accompanying CD-ROM includes a complete Linux security software library -- including powerful tools written by the author to detect cracker servers, and identify running cracker programs, even if they've been deleted from disk. More Information
  23. Jessica Brown posted a post in a topic in Computers
    Public-Key Cryptography /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Public-Key Cryptography by Arto Salomaa Publisher Springer Science & Business Media Published Date 2013-03-09 Page Count 247 Categories Computers / Security / General, Computers / Information Theory, Computers / Networking / Hardware, Technology & Engineering / Telecommunications, Mathematics / Combinatorics, Language Arts & Disciplines / Library & Information Science / General, Computers / Information Technology Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3662026279 Cryptography, secret writing, is probably as old as writing itself. But only recently has it become the object of extensive scientific studies. Vast new applications to data security are one explanation for this. Perhaps a more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book gives a broad overview of public-key cryptography, covering its essence and advantages, various public-key cryptosystems and protocols. It also gives a comprehensive introduction to classical cryptography and cryptanalysis. The book is self-contained and suitable both as a text and as a reference. It starts from the beginning but also includes some 1989 developments. The presentation is in many ways new, with some new results. The treatment is rigorous but avoids unnecessary formalism. The plaintext examples in the book form a package of basic sauna knowledge. More Information
  24. The Computer and the Brain /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Computer and the Brain An International Symposium in Commemoration of John Von Neumann (1903-1957) Held at Arizona State University, Tempe, 12-15.04.1987] by John Von Neumann Publisher Yale University Press Published Date 1967 Page Count 82 Categories Uncategorized Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
  25. National Educational Technology Standards for Students /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } National Educational Technology Standards for Students by International Society for Technology in Education Publisher ISTE (Interntl Soc Tech Educ Published Date 2007 Page Count 25 Categories Computers / Computer Literacy, Education / General, Education / Computers & Technology, Education / Standards (incl. Common Core) Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1564842371 Addresses the need for basic technology competence, and also incorporates the skills and knowledge that students require to learn effectively and live productively in an increasingly digital society. More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.