As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, in...
The world of machine learning is evolving so quickly that it's challenging to find real-life use cases that are relevant to your day-to-day work.
That's why we've created this comprehensive guide you can start using right away. Get everything you need - use cases, code samples and notebooks - so you can start putting the Databrick...
This book is an introduction to the language of systems biology, which is spoken among many disciplines, from biology to engineering. Authors Thomas Sauter and Marco Albrecht draw on a multidisciplinary background and evidence-based learning to facilitate the understanding of biochemical networks, metabolic modeling and system dynamics.
Their pe...
This book is aimed at managers, business owners, marketing managers, and aspiring social media marketing interns and managers. I will assume that however accomplished in your own field - baker, developer, teacher and that even as successful business owners, you approach the topic of social media marketing as a beginner. Even if you are an avid pers...
Policy-making to address grand challenges faces greater complexity than any previous project of modernization. Future scenarios are haunted by uncertainty and there is real ambivalence as to the values that policy should strive for. In this situation decision-makers look to research and innovation to provide answers and solutions. But neither can t...
Muhtadi's analysis of vote-buying in post-democratization Indonesia is original, profound, subtle, nuanced, and convincing as well as beautifully organized and well written. Equally important, its imaginative policy prescriptions will be widely read and cited as a significant contribution to the literature of comparative electoral politics. �...
This book focuses on central themes related to the conservation of bats. It details their response to land-use change and management practices, intensified urbanization and roost disturbance and loss. Increasing interactions between humans and bats as a result of hunting, disease relationships, occupation of human dwellings, and conflict over fruit...
What is the impact of information and communication technologies (ICTs) on the human condition? In order to address this question, in 2012 the European Commission organized a research project entitled The Onlife Initiative: concept reengineering for rethinking societal concerns in the digital transition. This volume collects the work of the Onlife ...
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains.
...
This book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Karlsruhe, October 23-24, 2018. Cyber Physical Systems are characterized by their ability to...
This book details tools and procedures for data collections of hard-to-reach, hard-to-survey populations. Inside, readers will discover first-hand insights from experts who share their successes as well as their failures in their attempts to identify and measure human vulnerabilities across the life course. Coverage first provides an introduction o...
This book was inspired by the UNESCO UNITWIN Network for Underwater Archaeology International Workshop held at Flinders University, Adelaide, Australia in November 2016. Content is based on, but not limited to, the work presented at the workshop which was dedicated to 3D recording and interpretation for maritime archaeology. The volume consists of ...
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Freque...
Interest in social innovation continues to rise, from governments setting up social innovation 'labs' to large corporations developing social innovation strategies. Yet theory lags behind practice, and this hampers our ability to understand social innovation and make the most of its potential. This collection brings together work by leadi...
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, writte...
At a time when contemporary challenges seem to many to be insurmountable, this book offers an optimistic view of the future and provides a road map for societies to get there. Drawing upon extensive research and many years as a thought leader in environmental and sustainability issues in Japan and internationally, Hiroshi Komiyama analyzes the most...
This stimulating open access volume details the innovative work of the Pan Institution Network for Global Health in creating collaborative research-based answers to large-scale health issues. Equitable partnerships among member universities representing North America, Africa, Asia, and Europe reverse standard cross-national dynamics to develop loca...
The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
Rethinking the ways global history is envisioned and conceptualized in diverse countries such as China, Japan, Mexico or Spain, this collections considers how global issues are connected with our local and national communities. It examines how the discipline had evolved in various historiographies, from Anglo Saxon to southern European, and its eme...
Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipm...
This book presents a selection of the best contributions to the Digital Cities 9 Workshop held in Limerick in 2015, combining a number of the latest academic insights into new collaborative modes of city making that are firmly rooted in empirical findings about the actual practices of citizens, designers and policy makers. It explores the affordanc...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This edited volume is concerned with the evolution and achievements of cooperation in research and innovation between Africa and Europe, and points to the need for more diversified funding and finance mechanisms, and for novel models of collaboration to attract new actors and innovative ideas. It reflects on the political, economic, diplomatic and ...
This open access volume is about how to research the influence of our changing media environment. Today, there is not one single medium that is the driving force of change. With the spreading of various technical communication media such as mobile phone and internet platforms, we are confronted with a media manifold of deep mediatization. But how c...
This collection of essays examines how spatial mobilities of people and practices, technologies and objects, knowledge and ideas have shaped the production, circulation, and transfer of knowledge in different historical and geographical contexts. Targeting an interdisciplinary audience, Mobilities of Knowledge combines detailed empirical analyses w...
This book presents nine outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico...
This book marks the first historical overview of the autism rights branch of the neurodiversity movement, describing the activities and rationales of key leaders in their own words since it organized into a unique community in 1992. Sandwiched by editorial chapters that include critical analysis, the book contains 19 chapters by 21 authors about th...
Consumer networks have revolutionized the way companies understand and reach their customers, making possible intricate measurement and accurate prediction at every step of every transaction. The same revolution is underway in our infrastructure, where new generations of sensor-laden power plants, cars and medical devices will generate vast quantit...
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Complexity science uses computation to explore the physical and social sciences. In Think Complexity, you'll use graphs, cellular automata, and agent-based models to study topics in physics, biology, and economics.
Whether you're an intermediate-level Python programmer or a student of computational modeling, you'll delve into exam...