Nonfiction » Computers & Internet

Sub-categories: Games | Internet | Social networking | Security | Blogging | Computer science | Digital publishing | Software development & engineering / general | Web / site design | Computer literacy | Information technology | Enterprise IT management | All sub-categories >>
Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats (UIT), Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats
Price: $6.99 USD. Words: 28,500. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 years within the government. The Unintentional Insider Threat (UIT)—the individual who is incompetent or careless and accidentally divulges sensitive information—is also a major concern.
Artificial Intelligence (AI) Applications for Automated Battle Management Aids (ABMA) in Future Military Endeavors - Tactical Decision Making, Battlespace Knowledge and Awareness, Prioritize Resources
Price: $6.99 USD. Words: 30,340. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Intelligence (AI) & semantics, Nonfiction » History » Military
Tactical environments can become highly complex in terms of threats, the tempo of events, the element of surprise or unexpected events, the limits of battlespace awareness, and the potential deadly consequences. This type of environment translates into a highly challenging decision space for tactical warfighters. Tactical decision-making tasks quickly surpass the cognitive abilities of humans.
Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity
Price: $6.99 USD. Words: 29,130. Language: English. Published: August 24, 2019. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security
The purpose of this research is to investigate, design and implement a statistical analysis-based insider threat detection product deployable to resource-disadvantaged systems and provide organizations with a method for baselining the network profiles and host activities unique to their operational environments.
A Study on Ad hoc on-Demand Distance Vector(AODV) Protocol
Price: Free! Words: 2,140. Language: English. Published: August 21, 2019. Categories: Nonfiction » Computers & Internet » Computer science
AODV is a very simple, efficient, and effective routing protocol for Mobile Ad hoc Net works which do not have fixed topology. This algorithm was motivated by the limited bandwidth that is available in the media that are used for wireless communications. It borrows most of the advantageous concepts from DSR and DSDV algorithms.
Awareness of Sim Swap Attack
Price: Free! Words: 1,520. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Cybernetics
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account,
Internet of Things(IoT) in HealthCare
Price: Free! Words: 1,430. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services.
Age invariant face recognition
Price: Free! Words: 2,240. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer science
Face recognition across age progression is remains one of the areas most challenging tasks now a days, as the aging process affects both the shape and texture of a face. One possible solution is to apply a probabilistic model to represent a face simultaneously with its identity variable, which is stable through time, and its aging variable, which changes with time.
A Survey Paper on Identity Theft in the Internet
Price: Free! Words: 1,350. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Identity of any internet user is stole in seconds and the user may not aware about it. There are various tools available in the internet which allow anyone to steal data of any particular user, if he she is connected to internet. The attacker is not required to have advanced knowledge about the internet technology or how networking works.
IoT Based Home Automation System Over Cloud
Price: Free! Words: 2,090. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Internet of Things IoT is a system of interrelated computing devices where all the things, including every physical object, can be connected making those objects intelligent, programmable and capable of interacting with humans. As more and more data are generated each day, IoT and its potential to transform how we communicate with machines and each other can change the world.
WSN based Temperature Monitoring System for Multiple Locations in Industry
Price: Free! Words: 2,330. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity,
Ciberseguridad al alcance de todos
Price: $5.99 USD. Words: 21,310. Language: Spanish. Published: August 19, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Education & Study Guides » Computers & technology
Este libro explica la Ciberseguridad dirigida a todos los públicos, de manera simple, sencilla, en lenguaje coloquial y ameno, con el objetivo de concientizar y mostrar a las personas cómo incrementar su nivel de seguridad y tranquilidad en el momento de usar cualquiera de sus dispositivos, ya sea que esté navegando en internet, usando su correo electrónico o comprando un artículo en línea.
Make Mobile App In A Day
Price: $4.99 USD. Words: 8,660. Language: English. Published: August 16, 2019. Categories: Nonfiction » Computers & Internet » Software Development & Engineering / Tools
Lets make an app which will run on iOS and android OS at the same time. We will learn to program a mobile app once and can deploy on Apple iStore or Google Play. We will get the taste of best of both the worlds. So lets get started with building our first app. Let' s make an app in a day. Are you ready and excited to focus your day through completing your first app in a day.
URL Masking
Price: $0.99 USD. Words: 1,930. Language: English. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Networking / security
URL Masking may be implemented on an e-commerce website where we purchase certain goods and services or be designed to receive money. A masked link can take us anywhere on the web and we are often guided by influencers or popular content to click on these links.
ENMASCARAMIENTO DE UN ENLACE O URL MASKING
Price: $0.99 USD. Words: 2,320. Language: Spanish. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Networking / security
De hecho, hay demasiado contenido en las redes sociales, que incluye los hiperenlaces que manipulan enmascarandose como otras direcciones web. No obstante, hay que reconocer que nosotros estamos siendo dirigidos por los miles de millones de usuarios en internet.
Основы работы программиста
Price: Free! Words: 180. Language: Russian. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Programming
Книга содержит описание нескольких ключевых принципов работы програмиста, на которые можно опираться в ежедневной работе.
Data Warehousing
Price: $2.59 USD. Words: 34,080. Language: English. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Database management / data warehousing, Nonfiction » Computers & Internet » Database management / data mining
Including basics of SQL and Informatica PowerCenter along with interview questions and sample scripts.
Foundations of QUBIT Construction -Hardware and Software -A Bit = Welcome To The Fantastic World of Nils Bohr. No Wait-NOreally!
Price: $99.00 USD. Words: 46,660. Language: English. Published: August 14, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general, Nonfiction » Computers & Internet » Logic design
QUBIT construction fails because of misunderstood physics and electron. Here are the necessary paradigm shifts as well as the direct path to implement FUNCTIONAL QUBITS. The Axioms include reinvented new physics principles. Instead of processing on off functions, instead of building binary gates and switches around this binary system,
Scrum Framework - For Course IS467 Agile Development Methodologies
Price: $3.99 USD. Words: 22,860. Language: English. Published: August 13, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general
This book is a custom version of "Scrum Narrative" specifically intended for Boston University students for their course IS467 Agile Development Methodologies by Ralph Covino, Ph.D. In addition to the introduction of Scrum, the book delves deeper into the finer aspects of Scrum, which is required for applying Scrum on the ground.
The Marmo Method Modelbuilding Guide #9: From An E-Book To A Hard Copy (or How To Print A PDF)
Price: $0.99 USD. Words: 2,780. Language: English. Published: August 12, 2019 by Rincom Productions. Categories: Nonfiction » Home & Garden » Crafts & Hobbies, Nonfiction » Computers & Internet » ebook readers
The ninth installment of The Marmo Method Modelbuilding Guide series is specifically designed for the modelbuilder who needs to print a few reference pages from an e-book while working on their latest masterpiece. Or who prefers to turn the entire e-book into a hard copy to relax with instead of staring at a computer or phone screen.
BluePrint for Software Engineering
Price: Free! Words: 6,000. Language: English. Published: August 11, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general, Nonfiction » Computers & Internet » Computer science
Well, here is a sloth friend who will sit with you for hours and hours and teach you some underlying philosophy of design and its principles. It’s going to be slow. Like already said, sloth slow. But my friend, that is how you will do it. That is how you will master it. That is how you will get to the foundations of it.