Catalog Search Results
Author
Description
Cybersecurity for Executives: A Guide to Protecting Your Business is an essential resource for business leaders who want to safeguard their organizations against cyber threats. In today's digital age, the security of sensitive information is paramount, and the risks of cyber-attacks are constantly increasing. This book provides practical guidance for executives to develop and implement effective cybersecurity strategies to protect their businesses...
Author
Description
Why should you read this book? To learn about crucial points in Employee Lifecycle Management (ELM), Identity and Access Management (IAM) and Enterprise Master Data Management (EMDM) • Connect the dots on Enterprise Master Data Management (EMDM) • Understand the relationship between ELM and Access Management • To learn about the competitive advantage and cost savings that comprehensive Identity and Access Management (IAM) bears • To learn...
Author
Publisher
Random House
Pub. Date
[2018]
Description
The phrase "skin in the game" is one we have often heard but have rarely stopped to truly dissect. It is the backbone of risk management, but it's also an astonishingly complex worldview that, as Nassim Nicholas Taleb shows in this book, applies to literally all aspects of our lives. In his inimitable style, Taleb pulls on everything from Antaeus the Giant to Hammurabi to Donald Trump to Seneca to the ethics of disagreement to create a jaw-dropping...
Author
Description
La ciencia es la forma de racionalidad determinante debido a sus consecuencias a gran escala. Vivimos actualmente varias revoluciones en la ciencia y este libro se ocupa de una de ellas: la teoría de la información, que implica aspectos como la Internet, las redes sociales, la web 3.0 y 4.0, la inteligencia artificial y varios más. El problema de base de este texto es presentar y discutir sumariamente la revolución de la información y sus conexiones...
Author
Description
Das JavaFX-Framework gibt es schon seit einigen Jahren, hat aber mit den ersten Versionen fast nur noch den Namen gemeinsam. Mit der Version 2 hat JavaFX einen festen und ausgereiften Stand erreicht und wird als die kommende Technologie im Java-Umfeld angesehen, um leistungsfähige und moderne grafische Benutzeroberflächen (GUI) erstellen zu können. Dieses Buch stellt Ihnen dazu eine Vielzahl an neuen Widgets und Komponenten samt einem neuen Java-API...
Author
Description
If you want to understand, without any technical jargon, what the limits, dangers, threats and conceptual flaws of artificial intelligence are, then this book is fully suited to your desire for knowledge and understanding.
You'll discover that AI, which wants to present itself as an exceptional computing advance, is in fact more than 10 years behind the technologies already available. And what's more, AI designers don't know how to explain the whys...
Author
Description
Aaron Vick's, "Humanity's Ledger: The Trust Protocol" invites readers on an insightful journey through the evolving world of blockchain technology and its profound impact on society. This thought-provoking work delves into the intricate relationship between cutting-edge digital innovations and the timeless human values of trust, community, and ethics.
Exploring the depths of decentralized systems, the book offers a nuanced understanding of how...
Author
Series
Description
Thinking of plunging into shell programming or are you just interested in learning the Linux command line and its core utilities?
If you're looking for an excellent text to get you started in your Linux classes, Practical Guide to Linux will be a valuable resource for you.
The guide assumes that you do not have any prior knowledge on how to execute the Linux command line, and moves to tell it in the simplest format possible. If you already have...
Author
Description
The design of information on the web changes the way people find, understand, and use that information-for better or for worse. Lisa Maria Marquis shows you how to leverage the principles and practices of information architecture in order to craft more thoughtful and effective digital spaces. Learn how to analyze your site's content and structure, build clear and consistent taxonomies, and develop more strategic sitemaps. Because when we're intentional...
Author
Series
Formats
Description
Do multiple versions of ourselves exist in parallel universes living out their lives in different timelines? In this follow up to his bestseller, The Simulation Hypothesis, MIT Computer Scientist and Silicon Valley Game Pioneer Rizwan Virk explores these topics from a new lens: that of simulation theory.
If we are living in a simulated universe, composed of information that is, rendered around us, then many of the complexities and baffling characteristics...
Author
Description
Salient Features:1. Complete and Focused Coverage of Syllabus in Very Simple Language.2. Expanded Coverage of Sorting Algorithms in Chapter-4.3. Expanded Coverage of NP-Completeness and Approximation Algorithms in Chapter-17.4. More than 250 solved Examples.5. A Quick Reference Table for Time Complexity of Algorithms in Apendix-II.6. Last 3 Years Solved University Question Papers in Appendix-III.7. Chapter-wise Short Type Questions with Answers in...
Author
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Description
Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more.
Taking an informal, conversational tone, author Michael Stueben offers programming stories, anecdotes, observations, advice, tricks, examples, and challenges based on his 38 years’ experience...
Author
Series
Description
This volume is the umbilical offshoot of its 'mother book', Science and the Soul. Both are truly original works. We begin by linking with the latter. Then, using facts from palaeoanthropology, biology (classical and molecular), information theory, design theory and philosophy, A Mutant Ape, assesses the two main interpretations of your human origin.
The simple difference between these interpretations is, identified. So also are the differences between...
Author
Description
Quantum physics, which offers an explanation of the world on the smallest scale, has fundamental implications that pose a serious challenge to ordinary logic. Particularly counterintuitive is the notion of entanglement, which has been explored for the past 30 years and posits an ubiquitous randomness capable of manifesting itself simultaneously in more than one place.
This amazing 'non-locality' is more than just an abstract curiosity or paradox:...
Author
Description
In "Humanity's Ledger: The Trust Protocol Overview", Aaron Vick embarks on a thought-provoking exploration of trust in our rapidly evolving digital world. This book dives into the transformative power of blockchain technology, redefining trust and transparency in the age of AI and automation. It challenges traditional notions of societal contracts and personal identity, offering insightful perspectives on the human essence in a technologically advanced...
Author
Description
Learn advanced techniques to improve the performance and quality of your predictive models
Key Features
Book Description
Python is a programming language that provides a wide range of features that can be used in the field of data science. Mastering Predictive Analytics with scikit-learn and TensorFlow covers various implementations of ensemble methods, how they are used with real-world datasets, and how they improve prediction accuracy in classification...
Author
Description
Daten werden überall gesammelt. Jeder Kauf, ob online oder offline, jede Autofahrt und jede Benutzung des Smartphones erzeugt Daten, die gespeichert werden. So entstehen Datenberge, die in atemberaubendem Tempo wachsen – für 2020 geht man von 40 Billionen Gigabytes aus. Aber was passiert dann mit diesen Daten? Wie werden sie ausgewertet? Und wer macht das?
Holger Aust nimmt Sie mit auf einen unterhaltsamen Ausflug in die wunderbare Welt der...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request