Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Gain a fundamental understanding of Python¿s syntax and features with this revised introductory and practical reference. Covering a wide array of Python¿related programming topics, including addressing language internals, database integration, network programming, and web services, yoüll be guided by sound development principles. Updated to reflect the latest in Python programming paradigms and several of the most crucial features found in Python 3, Beginning Python, Fourth Edition also covers advanced topics such as extending Python and packaging/distributing Python applications. Ten accompanying projects will ensure you can get your hands dirty in no time. You will: Become a proficient Python programmer by following along with a friendly, practical guide to the language¿s key features Write code faster by learning how to take advantage of advanced features such as magic methods, exceptions, and abstraction Gain insight into modern Python programming paradigms including testing, documentation, packaging, and distribution Work through several interesting projects, including a P2P file¿sharing application, chat client, video game, remote text editor, and more Who This Book Is For Programmers, novice and otherwise, seeking a comprehensive introduction to the Python programming language.
This book constitutes the proceedings of the 4th International Conference, IN4PL 2023, held in Rome, Italy, during November 15-17, 2023The 11 full papers and the 13 short papers included in this volume were carefully reviewed and selected from 33 submissions. The book focuses on research and development involving innovative methods, software and hardware, whereby intelligent systems are applied to industrial production and logistics. This is currently related to the concept of industry 4.0 - an expression reflecting the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, the industrial internet of things, industrial robotics, cloud computing, cognitive computing and artificial intelligence.
This open access textbook introduces and defines digital humanism from a diverse range of disciplines. Following the 2019 Vienna Manifesto, the book calls for a digital humanism that describes, analyzes, and, most importantly, influences the complex interplay of technology and humankind, for a better society and life, fully respecting universal human rights.The book is organized in three parts: Part I ¿Background¿ provides the multidisciplinary background needed to understand digital humanism in its philosophical, cultural, technological, historical, social, and economic dimensions. The goal is to present the necessary knowledge upon which an effective interdisciplinary discourse on digital humanism can be founded. Part II ¿Digital Humanism ¿ a System¿s View¿ focuses on an in-depth presentation and discussion of the main digital humanism concerns arising in current digital systems. The goal of this part is to make readers aware and sensitive to these issues, including e.g. thecontrol and autonomy of AI systems, privacy and security, and the role of governance. Part III ¿Critical and Societal Issues of Digital Systems¿ delves into critical societal issues raised by advances of digital technologies. While the public debate in the past has often focused on them separately, especially when they became visible through sensational events the aim here is to shed light on the entire landscape and show their interconnected relationships. This includes issues such as AI and ethics, fairness and bias, privacy and surveillance, platform power and democracy.This textbook is intended for students, teachers, and policy makers interested in digital humanism. It is designed for stand-alone and for complementary courses in computer science, or curricula in science, engineering, humanities and social sciences. Each chapter includes questions for students and an annotated reading list to dive deeper into the associated chapter material. The book aims to provide readers with as wide an exposure as possible to digital advances and their consequences for humanity. It includes constructive ideas and approaches that seek to ensure that our collective digital future is determined through human agency.
The present reprint encompasses all the articles that have been accepted and published in the Special Issue entitled "Probability, Stochastic Processes and Optimization". In applied research, Probability Theory is usually regarded as a distant, often-neglected relative of Statistics. This Special Issue attempted to rectify this misconception by publishing papers presenting novel applications and original models from the natural, computer, or social sciences, based on Probability and Stochastic Processes.
Scripting involves an ambiguity. First, it indicates a directive, as in the commands of "scripture"; or, in the disappointment that an apparently spontaneous happening was in fact "scripted." This engages a familiar outlook on computing: code is language operating in a "prescriptive" register. Additionally, however, scripting also hints towards the materiality of graphic "inscription," such as the traces expressed in the written form of a "manuscript." Thehistory of computing presented here is situated at the joints of these two senses. Working between them prompts an archaic image of the computer, far removed from advanced technologies of electronic machinery. It instead suggests its deep historical heritage in clerical labor, affording a perspective on computation as a manual, incorporated, and lived activity-that is, as the product of scribes.
Whether you are contemplating a career in service management or are working in the sector, this book will help you understand current trends, job opportunities, frustrations and progression. It also features contributions from industry professionals to show what their day-to-day service management role looks like.
In this compelling journey into Digital Transformation (DT) tailored for Nonprofit Organizations (NPOs), this book unravels the intricacies of technological integration. Grounded in over one hundred years of extensive research by authors and the editor, real-world examples, and using the San Diego Diplomacy Council (SDDC) as a primary case study, it introduces a tailored Digital Maturity Model (DMM) for NPOs. At the heart of this transformation are three pivotal pillars: Culture, Ethics, and Security.Part I sets the stage, painting a landscape of how NPOs have intertwined with the digital realm. As technology's omnipresence surges, Chapter Two offers a panorama of DT's historical and contemporary intersections with the nonprofit sector. The subsequent chapter emphasizes the stark reality: for many NPOs, digital adaptation is no longer about relevance but survival.Part II delves into the comparative digital strategies of NPOs and their for-profitcounterparts in Chapter 4, highlighting the need for tailored approaches. Chapter 5 explores the Nonprofit Digital Maturity Model (NDMM), using the San Diego Diplomacy Council as a focal point. The journey then unfolds further in Chapter 6, which casts a spotlight on the strategic execution of DT in NPOs, weaving in comprehensive analyses to dissect the forces shaping an NPO's digital trajectory.Part III dives deeper, with Chapter 7 laying the foundation of the NDMM. The subsequent chapter meticulously unpacks the NDMM, culminating in Chapter 9, which emphasizes the pillars of DT¿Culture, Ethics, and Security¿forming the essence of the Nonprofit DT Strategic Framework (NDTSF). This chapter also crafts a tailored roadmap for NPOs, charting a comprehensive DT course.Concluding with a forward-looking stance, Chapter 10 thrusts readers into the enthralling fusion of AI and NPOs, exploring transformative potentials and ethical concerns. Through real-world cases, it positions AI as both a potent tool and a vital dialogue for NPOs. Essentially, this book equips NPOs with tools like the NDMM and insights from successful DT narratives. It seeks to provide a practical guide for nonprofits through their DT journey, ensuring they harness technology ethically and effectively without compromising their core values.
The research field of data analysis and mining has attracted the interest of both academia and industry in recent years. This reprint contains 17 papers, which cover different topics of the broad research field of data analysis and mining. Each paper presents new data mining algorithms and techniques, as well as applications of data analysis and mining in real-world domains.
This book constitutes the refereed proceedings of the 22nd IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2023, held in Curitiba, Brazil, during November 9¿11, 2023.The 29 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 68 submissions. The contributions were organized in topical sections as follows: Artificial Intelligence and Algorithm; Digital Transformation and New Technologies; and Sustainable Technologies and Smart Cities.
Empowering you to investigate, analyze, and secure the digital realmDigital forensics is the art and science of extracting the hidden truth and this book is your hands-on companion, bringing the world of digital forensics to life. Starting with the core principles of digital forensics, the book explores the significance of various case types, the interconnectedness of the field with cybersecurity, and the ever-expanding digital world's challenges. As you progress, you will explore data acquisition, image formats, digital evidence preservation, file carving, metadata extraction, and the practical use of essential forensic tools like HxD, The Sleuth Kit, Autopsy, Volatility, and PowerForensics. The book offers step-by-step instructions, real-world case studies, and practical examples, ensuring that beginners can confidently set up and use forensic tools. Experienced professionals, on the other hand, will find advanced insights into memory analysis, network forensics, anti-forensic techniques, and more.This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails.WHAT YOU WILL LEARN¿ Learn how to set up and use digital forensic tools, including virtual environments. ¿ Learn about live forensics, incident response, and timeline examination.¿ In-depth exploration of Windows Registry and USBs.¿ Network forensics, PCAPs, and malware scenarios.¿ Memory forensics, malware detection, and file carving.¿ Advance tools like PowerForensics and Autopsy.WHO THIS BOOK IS FORWhether you are a tech-savvy detective, a curious student, or a seasoned cybersecurity pro seeking to amplify your skillset. Network admins, law enforcement officers, incident responders, aspiring analysts, and even legal professionals will find invaluable tools and techniques within these pages.
Schummeln ist neben Schwindeln mit Sicherheit Teil menschlichen Lebens. Es fängt schon im Kindergarten an mit Klauen von Spielsachen oder von Süßigkeiten. In der Schule wird abgeschrieben oder es werden Spicker benutzt. In der Berufswelt eröffnet die digitale Welt neue Möglichkeiten und berührt alle Lebensbereiche. Datenbetrug zielt auf geldliche Vorteile und Prestige ab oder wird vom Hass getrieben. Seine gesamte Breite wird sachlich vorgestellt und begründet, jedoch so, dass in vielen Fällen noch Schmunzeln über Einfallsreichtum und Tricksereien der Datenbetrüger möglich ist.Der Begriff Datenbetrug ist umfassend und reicht von A (Arzt im Profisport) bis Z (Zocken beim Fußball). Er ist nicht ausschließlich juristisch zu sehen, sondern ist ein gesellschaftlich-wirtschaftliches Phänomen jeder zivilisierten Gesellschaft. Die digitale Welt mit ihren virtuellen Räumen eröffnet allen Unredlichen künftig ganz neue, beängstigende Perspektiven.
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client¿s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What yoüll learnHow to handle and ongoing develop client relationships in a high end industryTeam management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.How to identify, understand, and over-deliver on client expectations.How to staff and develop talent within the team.Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.The various structures of services available that they may present to their clients.Who This Book Is ForThis book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.
"It's not enough to just build your Arduino projects; it's time to actually learn how things work!" This book goes beyond the basics, providing a comprehensive understanding of Arduino software and hardware, as well as how they intertwine. Gain valuable insights into the inner workings of Arduino and its language, and discover how to communicate with the microcontroller in its native language, AVR C++.Explore the latest version (0.30.0) which offers a multitude of configuration options that can be conveniently modified using the command-line interface (CLI).What Yoüll Learn:How the Arduino Language interfaces with the hardware, as well as how it actually works in C++;How to burn bootloaders with the latest version (0.30.0) of Arduino software.How to program your device using an In Circuit System Programmer (ICSP)How to build their own Arduino clone from scratchHow to efficiently handle different boards and libraries Uncover new features and enhancements, including the ability to set up and use profiles, and employ Makefiles.Who This Book Is For: This book welcomes everyone with an interest in learning about Arduino, regardless of expertise. Whether you're a beginner or an experienced Maker, "Arduino Software Internals" equips you with the knowledge to truly comprehend and leverage the power of Arduino.
Today's organizations must be prepared for tomorrow's events. Forecast future behavior in SAP Analytics Cloud with this comprehensive guide to predictive analytics! Start by learning about the data types, scenarios, and methods used in predictive analytics projects. Then follow step-by-step instructions to build, analyze, and apply predictive models to your business data using classification, time series forecasting, and regression analysis. Automate your models and dive into the data science with this all-in-one guide! In this book, you'll learn about: a. Predictive Scenarios and Projects Understand the basics of predictive analytics in SAP Analytics Cloud: scenarios, data types, and actions. Then plan your predictive project, including identifying the key stakeholders and reviewing the methodology. b. Build, Train, Analyze, and Apply Master predictive models from end to end. Create classification, time series, and regression models; then train them to identify business patterns. Analyze and apply the results of your models to data in SAP Analytics Cloud. c. Practical Demonstrations See predictive analytics in action! Identify use cases for predictive modeling. For each data model, understand practical applications through curated examples with sample business data. Highlights include: 1) Predictive scenarios 2) Predictive forecasts 3) Data modeling 4) Planning 5) Time series model 6) Classification model 7) Regression model 8) Multi-actions 9) Data science 10) Stories and dashboards
Unmasking the Dark Side of Social Media Subtitle: Exploring the Psychological Effects and Strategies for Digital Well-beingBook Title: Unmasking the Dark Side of Social MediaProduct Description:Discover the Hidden Threats: A Deep Dive into HPV Vaccine Non-VaccinationUnmasking the Dark Side of Social Media takes you on a riveting journey into the world of HPV vaccine non-vaccination among young adult women. Delve into the startling statistics and uncover the factors influencing the decisions of 78% of eligible women who chose not to receive the HPV vaccine. This eye-opening exploration is based on a comprehensive study utilizing data from the 2010 National Health Interview Survey Adult Cancer Supplement.Key Highlights:Unveiling the Reality:Shocking Statistics: Only 21% of US women had received ¿1 doses of the HPV vaccine as of 2010.Widespread Non-Vaccination: A staggering 78% of eligible women did not initiate vaccination.Lack of Awareness: Surprisingly, 35% of unvaccinated women were not even aware of the HPV vaccine.The Study's Approach:Data-Driven Insights: The study employs descriptive statistics, univariate procedures, and multivariate logistic regression to unravel the complexities behind non-vaccination.Predictive Model: Eight crucial variables form a robust predictive model, shedding light on the characteristics of women who opt out of HPV vaccination.Key Variables in the Model:Age: Older age is associated with a 2.93 times higher likelihood of non-vaccination.Marital Status: Being married increases the odds by 1.75 times.Maternal Status: Women with recent live births (past 5 years) are 2.77 times more likely to forego vaccination.Contradictory Influence: Current birth control use decreases the odds by 0.45 times.Geographical Impact: Living in the South correlates with a 0.50 times lower likelihood of vaccination.Healthcare Engagement: Women who haven't had a recent doctor's visit are 0.45 times more prone to non-vaccination.Preventive Health Services: Non-receipt of flu and tetanus shots significantly increases the odds of not getting the HPV vaccine.Model Validation:Data Fit: The model demonstrates a good fit (Hosmer-Lemeshow chi-square=14.41(8); p=0.07).Predictive Power: Max rescaled R-square=0.27; c statistic=0.80.Implications for Action:These findings underscore the critical need for targeted vaccine promotion campaigns. Older age, marital status, recent childbirth, Southern residence, and limited engagement with preventive health services emerge as key factors associated with non-vaccination. Unmasking the Dark Side of Social Media is a must-read for anyone interested in public health, shedding light on the complex interplay between social dynamics and healthcare decision-making. Get your copy now and equip yourself with the knowledge to navigate the intricate landscape of vaccine uptake.HPV vaccine;Social media impact;Women's health;Non-vaccination factors;Public health;Predictive modeling;Vaccine awareness;Preventive healthcare;Maternal health;Healthcare decision-making;National Health Interview Survey;HPV vaccine uptake;Health disparities;Targeted promotion campaigns;Southern residence;Marital status influence;Age and vaccination;Social determinants of health;Healthcare engagement;Public health interventions;;;;;Regenerate
This book constitutes the refereed proceedings of the IFIP WG 8.2 and WG 9.4 Joint Working Conference on After Latour: Globalisation, Inequity and Climate Change, IFIPJWC 2023, held in Hyderabad, India, during December 7¿8, 2023.The 15 full papers presented together with 13 short papers were carefully reviewed and selected from 60 submissions. They are organized in topical sections as follows: climate change and digital sustainability; ICT¿s and sustainable development; IS in the education sector; privacy, trust, and surveillance; theories and methods.
Author and streamer Travis I. Sivart brings you a primer for streaming on Twitch.tv covering more than just technicals, and instead giving you insight into image, content, how to gain an audience, and how to keep your viewers coming back for more.Travis started doing live, interactive street theater in 1990, went to broadcasting school in 2003, created his first podcast in 2007, changed to live internet pirate radio in 2012, and began live streaming in 2017. Since he published his first book in 2013, he's been a guest speaker at dozens of conventions, and has done numerous live broadcasts. The point of all that is; He knows a bit about presentation and interacting with the public in an entertainment role.One of the main points Travis wants streamers to remember is, "Something that always goes with having fun is to be yourself. People would rather watch someone awkward who's having fun, than a professional being miserable. That's a truth that you can bank on."Book 4 in the "27 Thoughts on Social DIY" series.
Discover the next generation of BI with this guide to SAP Analytics Cloud! Get your data into the system and see which data models to use in which situations. Next, learn about stories-how to create visualizations for them, publish them, and enhance them. With expanded information on the analytics designer, analytics catalog, and planning models, this fully updated edition is your one-stop shop for all your SAP Analytics Clouds needs! Highlights include: 1) Data modeling 2) Stories 3) Visualizations 4) Dashboards 5) Financial planning 6) Analytics designer 7) Analytics catalog 8) SAP Digital Boardroom 9) SAP Analytics Hub 10) Data integration 11) Administration
Easier audits, protection again fraud, streamlined process controls-this is why you need SAP Process Control in your organization. With this comprehensive guide, see how to implement and configure the solution, from maintaining connectors to defining master data. Follow step-by-step instructions to use control evaluation procedures, report on and remediate ad hoc issues, and automate controls with continuous controls monitoring (CCM). With information on using standard reports, enabling SAP Fiori apps, and adding SAP Financial Compliance Management to your landscape, this SAP Process Control guide has everything you need! Highlights include: 1) Internal controls 2) Governance 3) Configuration 4) Master data 5) Control evaluation 6) Ad hoc issues 7) Continuous controls monitoring (CCM) 8) Policy lifecycle 9) Reporting 10) SAP Fiori 11) SAP Financial Compliance Management
Juggling multiple partners and clients? Streamline your business communications with this guide to electronic data interchange (EDI) in SAP S/4HANA! Begin with an overview of EDI processing and how it works. Next, follow step-by-step instructions for configuring and managing EDIs in your SAP S/4HANA landscape. Customize IDocs, configure SAP Application Interface Framework and SAP Integration Suite, test your EDI solution, and more. This is your one-stop shop for comprehensive B2B integration in SAP S/4HANA! Highlights include: 1) Prerequisites 2) Environment setup 3) EDI standards 4) Configuration 5) SAP Application Interface Framework 6) SAP Integration Suite 7) SAP Business Technology Platform (SAP BTP) 8) Test automation 9) IDocs 10) APIs
It's finally here-your guide to Python for engineers and scientists, by an engineer and scientist! Get to know your development environments and the key Python modules you'll need: NumPy, SymPy, SciPy, Matplotlib, and VPython. Understand basic Python program structures and walk through practical exercises that start simple and increase in complexity as you work your way through the book. With information on statistical calculations, Boolean algebra, and interactive programming with Tkinter, this Python guide belongs on every scientist's shelf! Highlights include: 1) Program structures 2) NumPy 3) Matplotlib 4) SymPy 5) SciPy 6) VPython 7) Tkinter 8) Numerical calculations 9) Statistical calculations 10) Boolean algebra
Der vorliegende Band markiert einen initialen Schritt zur umfassenden Erörterung des Themenfelds ¿Vertrauen in KI¿ aus vielfältigen Blickwinkeln. Dabei wird eine Herangehensweise sowohl aus wirtschafts- und sozialwissenschaftlicher als auch aus informationstechnischer Perspektive gewählt, die zudem interdisziplinäre Aspekte einbezieht. Insgesamt präsentiert der Band fünfzehn Beiträge von 25 renommierten Autorinnen und Autoren, die ihre Expertise aus vierzehn unterschiedlichen Einrichtungen einbringen. Ziel dieser Debatten ist es, Lernende, Lehrende, Forschende sowie Entscheidungsträgerinnen und -träger aus Politik und Wirtschaft dazu zu befähigen, auf Basis von Fakten eine fundierte Meinung zu bilden. Auf dieser Grundlage sollen sie in der Lage sein, gut durchdachte persönliche Entscheidungen im Umgang mit KI zu treffen.
"How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes? This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps emphasizes prerequisites that lead to success through best practices and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations. You'll learn how DevOps and DevSecOps can eliminate the walls that stand between development, operations, and security so that you can tackle the needs of other teams early in the development lifecycle. This book helps you: Learn why DevSecOps is about culture and processes, with tools to support the processes; Understand why DevSecOps practices are key elements to deploying software in a 24-7 environment; Deploy software using a DevSecOps toolchain and create scripts to assist; Integrate processes from other teams earlier in the software development lifecycle; Help team members learn the processes important for successful software development"--
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.