Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Essential reading for philosophers of science, epistemologists, and modelers in various scientific disciplines, Modeling the Possible is also suitable for anyone interested in model-based scientific inferences, their validity, and the policy conclusions derived from them.
'With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history.' -Anne Applebaum, bestselling author of Twilight of Democracy'A chilling account of a Kremlin-led cyberattack, a new front in global conflict" -Financial TimesThe true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it.In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses-from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage-the largest, most destructive cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in service of Russia's military intelligence agency, their talents are matched by their willingness to launch broad, unrestrained attacks targeting government and the private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur-with world-shaking implications.
This book explores the critical need for a holistic understanding of order and intelligence amid advances in AI and hyperconnectivity.
Maciej Rys-a hackathon leader and scholar with extensive experience in the field-offers a step-by-step guide to organizing successful hackathons and understanding their dynamics.
This book provides a comprehensive sweep of key issues facing the evolving discipline of workforce analytics. The Editors, all globally recognised in this field, have curated a collection of unique pieces that introduce workforce analytics, discuss its place in the HR sphere and systematically work through the key practical challenges.
This book provides a comprehensive sweep of key issues facing the evolving discipline of workforce analytics. The Editors, all globally recognised in this field, have curated a collection of unique pieces that introduce workforce analytics, discuss its place in the HR sphere and systematically work through the key practical challenges.
Use serverless technologies to build applications that scale, more quickly and easily, and without worrying about deployment. Whether you're writing an API, a full-stack app, or real-time code, harness the power of serverless on Cloudflare's platform so you can focus on what you do best: delivering solutions. With hands-on instruction and code samples throughout, you'll go from building a simple API to analyzing images with AI. And, when it's time to launch, you'll learn how to deploy your applications and websites automatically, and how to optimize their performance for production. For decades, applications have been built and deployed in a similar way: you write code, provision a server, and upload your code. Over the years, you've graduated from FTP or SSH to Docker and Kubernetes, but fundamentally you've just switched from owning to renting; you're paying 24/7 for the server hosting your app. Serverless technologies change that model. With serverless, you focus on writing code, and not how it's deployed. You only pay for when your application code is executed, rather than paying for idle servers. In this book we'll use Cloudflare, which was built from the ground up to be a serverless platform, but the same concepts apply to every serverless provider. With this book, you'll learn a better way to build applications, and you'll see improved productivity and ease of deployment. From secrets to dependencies, such as databases and caches, Cloudflare has revolutionized how to build applications, and has made building applications easier and more fun. As you go through the book, you'll learn in detail what serverless is, how it functions behind the scenes, and how to build serverless applications on Cloudflare. When you finish this book, you'll understand how to think in terms of serverless functions, and you'll have the experience of deploying and extending these apps as you work through the examples. What You Need: Mac or PC GitHub account (free) Cloudflare account (free)
Learn how to implement an integrated AI strategy that connects your marketing, sales and customer experience, to achieve and sustain the competitive edge.
The book addresses the theories and applications of the multi-objective optimization algorithm in a single volume. It further covers advanced modifications of multi-objective optimization algorithms. The book discusses multi-objective optimization for diverse engineering applications.
Humans and Cyber Security: How Organisations Can Enhance Resilience through Human Factors delivers an applied approach to capturing and mitigating the risk of the human element in cybersecurity and proposes that it is easier to change organisational practices than it is individual behaviour.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
The proceedings of the First International Conference on Equipment Intelligent Operation and Maintenance (ICEIOM 2023) explores the processes that ensure safe operation of equipment and guarantee longer product life cycles. The papers highlight how big data and machine learning make equipment operation highly automated and ingenious.
The proceedings of the First International Conference on Equipment Intelligent Operation and Maintenance (ICEIOM 2023) explores the processes that ensure safe operation of equipment and guarantee longer product life cycles. The papers highlight how big data and machine learning make equipment operation highly automated and ingenious.
Thia book explores the applications of GNSS technology in different fields of Earth and space observations and provides researchers, professionals, and students valuable insights into these emerging trends. It discusses challenges that impact the performance of GNSS technology and offers solutions through case studies from global experts.
Get the lowdown on CockroachDB, the elastic SQL database built to handle the demands of today's data-driven world. With this practical guide, software developers, architects, and DevOps teams will discover the advantages of building on a distributed SQL database. You'll learn how to create applications that scale elastically and provide seamless delivery for end users while remaining exceptionally resilient and indestructible.Written from scratch for the cloud and architected to scale elastically to handle the demands of cloud native and open source, CockroachDB makes it easier to build and scale modern applications. If you're familiar with distributed systems, you'll quickly discover the benefits of strong data correctness and consistency guarantees as well as optimizations for delivering ultralow latencies to globally distributed end users.With this thorough guide, you'll learn how to:Plan and build applications for distributed infrastructure, including data modeling and schema designMigrate data into CockroachDBRead and write data and run ACID transactions across distributed infrastructureOptimize queries for performance across geographically distributed replicasPlan a CockroachDB deployment for resiliency across single-region and multiregion clustersSecure, monitor, and optimize your CockroachDB deployment
This book examines the role that intellectual property plays in fostering innovation within knowledge societies, with a focus on the role of emerging technologies such as Artificial Intelligence tools. It will appeal to researchers in the field of Intellectual Property Law, international law, business law and emerging technologies like AI.
The book presents next-generation education technology and the pedagogy of the Education Cloud. It covers technological developments, case studies, innovative research approaches and solutions for advanced learning paradigms using IoT, cloud computing, and machine learning to handle various challenges of the smart education system.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.