Introduction to Health and Safety at Work has quickly established itself, in its first six years, as the foremost text for students taking the NEBOSH National General Certificate. It is also of great value to those studying for level 3 N/SVQ, the IOSH Managing Safely Award and similar management and supervisor focused learning. It has become a significant work of reference for managers with hea…
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book.
This book provides an in-depth analysis of the Australian cybercrime landscape, covering the latest trends, tools, and tactics used by cybercriminals. The book also explores the steps being taken by Australian authorities and cybersecurity professionals to address these threats. Through theory, case studies, and real-world examples, this book offers a comprehensive overview of the challenges fa…
Counterintelligence refers to the efforts undertaken by intelligence agencies to prevent and detect attempts by foreign entities to gather sensitive or classifed information from a country's government, military, businesses, or other organizations. In the twentyfirst century, counterintelligence has become increasingly important as the world has become more connected through the internet and di…
There are not many security-related books in Chinese; the few that have been published deal mostly with handy skills when countering hacker attacks. This book not only describes skills and techniques but also tries to solve security problems in a constructive manner. What I admire about Wu is that he is always willing to collaborate with his colleagues to build a more secure Internet environmen…
This book is focused on the complex problem of controlling air pollution and mitigating its adverse effects on human health and the environment. It is written by leading experts in the field and addresses many aspects of air pollution, including monitoring and source characterization of air pollution, the theory and application of air quality modeling, health effects and risk assessment, air qu…
This book is primarily addressed to students who are taking a course on the C++ language, to those who wish to self-study the C++ language, as well as to programmers who have experience with C and want to move on to C++. It could also prove useful to instructors of the C++ course, who are looking for explanatory programming examples to add in their lectures.
This book is ideal for Python programmers who want to explore the tools available in the Python ecosystem in order to build their own IoT web stack and IoT-related projects. People from creative and designing backgrounds will also find this book equally useful.
This book is about using data to understand how social media services are used. Since the advent of Web 2.0, sites and services that give their users the power to actively change and contribute to the services’ content have exploded in popularity. Social media finds its roots in early social networking and community communication services, including the bulletin board systems (BBS) of the 198…
Because of the increasing complexity and growth of real-world networks, their analysis by using classical graph-theoretic methods is oftentimes a difficult procedure. Thus, there is a strong need to combine graph-theoretic methods with mathematical techniques from other scientific disciplines, such as machine learning, statistics, and information theory, for analyzing complex networks more adeq…
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advanta…
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
The response to the first and second editions of Python Crash Course has been overwhelmingly positive. More than one million copies are in print, including translations in over 10 languages. I’ve received letters and emails from readers as young as 10, as well as from retirees who want to learn to program in their free time. Python Crash Course is being used in middle schools and high schools…
Riset tanaman obat dari hutan merupakan program riset prioritas nasional bagi Kementerian Kesehatan. Namun demikian, Kementerian Lingkungan Hidup dan Kehutanan (KLHK) dalam hal ini Badan Litbang dan Inovasi (BLI) sebagai penanggungjawab dan pengelola riset yang berkaitan dengan bioprospeksi dari biodiversitas hutan tropis, juga melakukan riset tanaman obat dari hutan tropis Indonesia. Output u…
Plastics are increasingly used in modern-day life due to their wide-ranging properties which can be used in a variety of applications. ‘Plastics Waste Management: Processing and Disposal’ is primarily written from an industrial point-of-view and relates waste management to understanding the correct processes for dealing with the growing issue of plastics waste. This book mainly focuses on p…
Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models. With a set of best practices based on case study analysis, expert …
This book, Cisco Unity Connection, by Dave Schulz, hits the bull’s-eye of its intended topic: Cisco Unity Connection. This book zeroes in on the target with clarity and depth. Anyone that uses or considers using the Cisco Unity Connection product needs a copy of this book to read when planning a deployment, administering the features, or troubleshooting problems. Simply put, it’s the kind o…
Biotransformation of Agricultural Waste and By-Products in the 4F Economy: The Food, Feed, Fiber, Fuel (4F) Economy presents an evaluation of plant species better exploitable for a particular transformation. As crops are already covering large parts of cultivable soils, is it is not conceivable to try to extend the cultures beyond the limit of available soils, but a further increase in producti…
Today’s researchers estimate that application programming interface (API) calls make up more than 80 percent of all web traffic. Yet despite their prevalence, web application hackers often fail to test them. And these vital business assets can be riddled with catastrophic weaknesses. As you’ll see in this book, APIs are an excellent attack vector. After all, they’re designed to expose in…
Data visualization is part art and part science. The challenge is to get the art right without getting the science wrong, and vice versa. A data visualization first and fore‐ most has to accurately convey the data. It must not mislead or distort. If one number is twice as large as another, but in the visualization they look to be about the same, then the visualization is wrong. At the same ti…
The Microservices Architecture (MSA) style is currently gaining a lot of momentum among software architects and engineers. MSA is accelerating software solution design, development, and deployment in a risk-free manner. Taking any software system into production is elegantly simplified and sped up through the smart application of the various competencies of MSA (development platforms, runtime e…
Data-driven optimization forms the central focus of this textbook. Allying the population-based metaheuristics of evolutionary computing with the use of surrogate models and machine learning algorithms, the authors demonstrate a formidable array of approaches to address a range of data-driven optimization challenges.
Parangtritis Geomaritime Science Park (PGSP) memiliki Visi sebagai center of excellent for geospatial information technology, education, research and innovation di bidang kepesisiran dan kelautan di Indonesia. Berbagai misi telah disusun sebagai jembatan mewujudkan visi PGSP. Terkait dengan Visi tersebut, PGSP melakukan penyusunan buku untuk mendukung eksistensi, pengembangan, dan wujud dedikas…
C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing t…
With four English editions, and translations into four other languages forthcoming. This edition added some classical material that may have been missed so far, in particular on linear programming, the network simplex algorithm, and the max-cut problem. This edition also added a number of new exercises and up-to-date references.
This research was conducted under the auspices of the Safety and Justice Program within RAND Infrastructure, Safety, and Environment (ISE). The mission of ISE is to improve the development, operation, use, and protection of society’s essential physical assets and natural resources and to enhance the related social assets of safety and security of individuals in transit and in their workplaces…
By the dawn of the new millennium, robotics has undergone a major transformation in scope and dimensions. This expansion has been brought about by the maturity of the field and the advances in its related technologies. From a largely dominant industrial focus, robotics has been rapidly expanding into the challenges of the human world. The new generation of robots is expected to safely and depe…
Humans are indispensable components in Cyber-Physical Systems (CPSs) due to their cognitive capacities and the ultimate goal to support rather than supersede humans. The close integration of humans, CPSs, and Artificial Intelligence (AI) creates AI-Powered Human-Cyber-Physical Systems (HCPSs) that drive the development of Industry 5.0 and revolutionize the future of work. Despite the remarkable…
This book will inform about wireless networking and around it
This book presents the fundamentals and advances in the field of data visualization and knowledge engineering, supported by case studies and practical examples. Data visualization and engineering has been instrumental in the development of many data-driven products and processes. As such the book promotes basic research on data visualization and knowledge engineering toward data engineering and…
Microbiology is an exceptionally broad discipline encompassing specialties as diverse as biochemistry, cell biology, genetics, taxonomy, pathogenic bacteriology, food and industrial microbiology, and ecology. A microbiologist must be acquainted with many biological disciplines and with all major groups of microorganisms: viruses, bacteria, fungi, algae, and protozoa. The key is balance. Studen…