Developments in Language Theory
This LNCS conference volume constitutes the proceedings of the29th International Conference on Developments in Language Theory, DLT 2025, in Seoul, South Korea, in August 2025. The 18 full papers and 2 invited papers included in this book were carefully reviewed and selected from 38 submissions. They presented current developments in formal languages and automata. Its scope is very general and includes, among others, the following topics and areas: grammars, acceptors and trans-ducers for words, trees and graphs; algebraic theories of automata; algorithmic and many more.
Advances in Cryptology - Crypto 2025
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Advances in Cryptology - Crypto 2025
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
8-Bit Stories
Join me on a trip down memory lane as we look at the highs and lows of the UK computer scene. With giants like Atari, Commodore, and Texas Instruments taking on our tiny British companies. Could Sinclair and Acorn take on the American muscle of Commodore? Well, for a considerable amount of time, they did, but why did the multi-million-selling Spectrum disappear? Why did the government-endorsed BBC Microcomputer fail to sell into most UK homes?Why did the Acorn Electron fail? Given the might of Commodore and Atari, did the Dragon 32 or Oric Atmos ever stand a chance? With millions of pounds on the line, can they even survive the year? Late releases, missed deadlines, and financial disasters all await our fledgling companies. Can the strange 8/16-bit hybrid Ti99/4 beat the Commodore VIC-20? Is the Oric 1 better than a Spectrum 48k? We look at a year-by-year history of the 1980s and the computers and companies selling here in the UK.What happened to the global dominance of UK computers... Amstrad managed to capture some of the European markets, along with Sinclair and Acorn. Ultimately, Commodore International would dominate the home computer scene, while Atari would briefly control the console market until the Japanese arrived, but what happened to MGT, Tangerine, Lynx, and Dragon Data? What became of Amstrad or the Enterprise64? The UK home computer (8-bit) scene is covered from 1980 until 1988.
Advances in Cryptology - Crypto 2025
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
The Billionaire Blueprint
The Billionaire Blueprint: Cracking the AI Gold RushThink the AI revolution is meant for tech elites, robots, or sci-fi movies? Think again. Cracking the AI Gold Rush strips away the jargon, reveals billionaire-level strategies, and shows how anyone can get in on the biggest wealth opportunity of our generation.Packed with eye-opening stories and actionable insights, you'll learn: How AI is transforming every industry-from healthcare to real estate to streaming servicesHow billionaires like Musk, Huang (NVIDIA), Bezos, and visionaries behind OpenAI built empires with AI and momentumSimple, no-code ways to start your own AI venture, even if you can't codeInvesting strategies that allow you to profit from AI without quitting your day jobThe infrastructure plays: GPUs, cloud platforms, and data selling the tools while the world mines the goldEthical pitfalls and how to build responsibly, because billion-dollar success should never come at the cost of human well-beingWhy this book is different: No PhD required: Designed for readers who just want straight talk, not technical complexityFun with a purpose: Witty, joke-packed writing to keep you engaged, even when you're late at night, half-asleep, and still scrollingAction-oriented: Every chapter ends with a practical step or exercise, no fluff, just fuel for your next moveTimely and viral: Taps into the global AI craze with real strategy, not hype���� Praise from insiders (imagined blurbs to build social proof): "A billionaire's manual for the rest of us-easy, exciting, and transformative.""This book made me feel like I deserve a seat at the AI table."Don't just watch the AI revolution. Join it, profit from it, and lead it. Grab your copy now and start building your billionaire blueprint today.
Advances in Cryptology - Crypto 2025
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025. The total of 156 full papers presented in the proceedings was carefully reviewed and selected from 643 submissions. They focus on cryptographic topics such as foundational theory and mathematics; the design, proposal, and analysis of cryptographic primitives and protocols; secure implementation and optimization in hardware or software; applied aspects of cryptography.
Understanding the Human Factor in Cyber Security
In an age where firewalls and encryption are just the beginning, Understanding the Human Factor in Cyber Security: A Comprehensive Investigation delves deep into the most overlooked vulnerability in any system: human behavior. Drawing on real-world case studies like the Target, Equifax, and WannaCry breaches, Christopher Stephenson exposes the psychological, behavioral, and organizational pitfalls that hackers exploit with ease. This book is not just about the breaches, but about why they happen, how cognitive biases, stress, lack of awareness, and misplaced trust open the door to cyber threats. With a powerful blend of psychological insight, policy analysis, and practical strategies, Christopher presents a roadmap for individuals, professionals, and organizations to recognize and close the human gaps in their digital defense. Whether you're a cybersecurity specialist, a business leader, or simply someone navigating the digital world, this book will change how you think about security. Because in the end, the strongest system is only as secure as the people who use it. Fun Fact: When Christopher isn't decoding human behavior in cyberspace, he's clocking miles on his treadmill while reading the latest cybersecurity breach reports, fitness, and firewalls, all in a day's work!
Scalable Data Pipelines
Scalable Data Pipelines Architecting for the Petabyte Era is a timely and essential guide for professionals navigating the explosive growth of data in today's digital world. As organizations generate data at unprecedented rates from everyday user interactions to complex industrial IoT readings the need for robust scalable data infrastructure has never been more critical. This book presents a practical and insightful roadmap for building high-performance data pipelines that can handle massive datasets with efficiency reliability and foresight.Designed for data engineers architects scientists and tech leaders this book goes beyond theoretical concepts to deliver real-world strategies for designing data pipelines that are ready for the demands of the petabyte era. It offers in-depth coverage of everything from data ingestion and storage to transformation processing and delivery while incorporating modern architectural approaches such as distributed systems microservices and cloud-native frameworks. Readers will gain valuable knowledge on how to leverage tools like Apache Spark Kafka and cloud data platforms to build pipelines that are both resilient and future ready.With a focus on performance optimization fault tolerance and operational excellence Scalable Data Pipelines is a must have resource for anyone involved in the data lifecycle. Whether you are optimizing current systems or designing new ones from the ground up this book equips you with the tools insights and confidence to turn data overload into competitive advantage.
Computational Science and Computational Intelligence
The CCIS book constitutes selected papers accepted in the Research Track on Artificial Intelligence of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The 25 full papers included in this book were carefully reviewed and selected from a total of 383 submissions. They were organized in topical sections on machine learning, neural networks, knowledge graphs, and applications; artificial intelligence and novel applications; and computational intelligence and applications.
Generalizing from Limited Resources in the Open World
This book presents the proceedings from the Third International Workshop on Generalizing from Limited Resources in the Open World (GLOW) 2025 held in conjunction with the International Joint Conference on Artificial Intelligence, IJCAI 2025, in Montreal, Canada, during August 16-22, 2025. The 12 full papers in this book were carefully reviewed and selected from 27 submissions. These papers focus on the academic exploration of efficient methodologies within the realm of artificial intelligence models. We concentrated on both data-efficient strategies, such as zero/few-shot learning and domain adaptation, as well as model-efficient approaches like model sparsification and compact model design.
Headless WordPress, Formidable Power
Headless WordPress, Formidable Power: An Enterprise Guide to Structured Data, APIs, and JavaScript FrontendsBook 1 of the Masterminds Enterprise Developer SeriesBy Victor M. Font Jr.What if WordPress wasn't just for content-but for composable applications?Headless WordPress, Formidable Power is your blueprint to unlocking the full potential of WordPress in a decoupled, enterprise context. Written for developers, architects, and technical decision-makers, this book introduces a bold, structured approach to building modern systems with WordPress as your backend engine-and Formidable Forms as your secret weapon.You'll discover how to: Use REST APIs to connect frontend frameworks like React, Vue, and SvelteSubmit and manage structured data through Formidable Forms in headless modeImplement SSO, JWT, and OAuth2 authentication for secure integrationsNavigate legacy plugin compatibility issues in decoupled buildsDeploy with Vercel, Docker, GitHub Actions, and moreWith metaphor-rich storytelling-yes, including the Headless Horseman-and deep technical insights, this guide is equal parts engaging and actionable.Whether you're transitioning a WordPress site into a scalable platform or architecting from scratch, Headless WordPress, Formidable Power gives you the tools, mindset, and confidence to build with purpose.The frontend is gone. The power remains.Perfect for: WordPress developers ready to level upAgencies adopting API-first workflowsEnterprise teams bridging legacy and modern systemsFormidable Forms power users looking to scaleWritten by Victor M. Font Jr., enterprise consultant and creator of Formidable Masterminds, this book guides you from implementer to application architect-no plugin fluff, just practical power.Available in paperback and Kindle. "Part of the Masterminds Enterprise Developer Series: Professional tools, techniques, and architecture for building scalable, secure, and structured WordPress applications."
The Science of Functional Programming, Part II
This book is a pedagogical in-depth tutorial and reference on the functional programming paradigm. Starting from issues found in practical coding, the book builds up the theoretical intuition, knowledge, and techniques that functional programmers use for for rigorous reasoning about types and code. The second part of the book focuses on working with laws, structural analysis, and code for functors, monads, and other typeclasses, as well as the required techniques of symbolic derivation and proof. Detailed explanations and derivations are accompanied by solved examples tested in the Scala interpreter, as well as exercises and discussions that further build upon each chapter's material. The difficulty of this book's mathematical material is at the level of undergraduate multivariate calculus.
Advances in Smart Computing and Applications
This book constitutes the refereed proceedings of the 1st International Conference on Advances in Smart Computing and Applications, ICASCA 2025, held in Ahmedabad, India, during February 15-16, 2025. The 25 full papers were presented in this volume were carefully reviewed and selected from 112 submissions. They focus on Machine Learning, Deep Learning, Transfer Learning, Neural Computing, Artificial Intelligence, Reinforcement Learning, Recommendation systems, Soft computing, Intelligent Systems, Pattern Recognition, Natural Language Processing, Big Data Analytics, Networks, Text Mining, Web Mining, Data Streams, Image Processing, Distributed Databases, Block Chain.
Taking the Anxiety Out of AI
As AI becomes more widespread in the workplace and in society, what impact will it have on your job, your life and the world around you? If AI can take on more and more of the tasks people perform at work, and do them more efficiently, where does that leave human beings? Taking the Anxiety out of AI explores the nature of human intelligence and artificial intelligence, and considers what AI can do and what it can't do, what tasks will always be performed better by humans, and what the future will look like in a world where humans and AI work together. Whether you have experience using AI or have just decided to get started with it right now, this book is an essential guide for navigating the new future.
Machine Learning and Deep Learning in Natural Language Processing
Natural Language Processing (NLP) is a sub-field of Artificial Intelligence, linguistics, and computer science and is concerned with the generation, recognition, and understanding of human languages, both written and spoken. NLP systems examine the grammatical structure of sentences as well as the specific meanings of words, and then they utilize algorithms to extract meaning and produce results. Machine Learning and Deep Learning in Natural Language Processing aims at providing a review of current Neural Network techniques in the NLP field, in particular about Conversational Agents (chatbots), Text-to-Speech, management of non-literal content - like emotions, but also satirical expressions - and applications in the healthcare field.NLP has the potential to be a disruptive technology in various healthcare fields, but so far little attention has been devoted to that goal. This book aims at providing some examples of NLP techniques that can, for example, restore speech, detect Parkinson's disease, or help psychotherapists.This book is intended for a wide audience. Beginners will find useful chapters providing a general introduction to NLP techniques, while experienced professionals will appreciate the chapters about advanced management of emotion, empathy, and non-literal content.
The Resilient Product Manager
After chatting with other product managers, talking with industry pros, and getting insights from all sorts of real-world situations, this book puts together patterns and practices that have worked well when the pressure's on. The seven case stories in this book show how these companies dealt with situations that the usual approach didn't cover. Whether it was rethinking how to predict engagement, estimating demand in uncertain conditions, or containing operational breakdowns before they spiraled, the people behind these stories had to adapt quickly, think clearly, and act with purpose.You'll learn how to take raw data and turn it into useful information. You'll learn about things like sampling strategies, confidence intervals, and sensitivity testing. You'll see how teams align on priorities through collaborative workshops, root-cause analysis, and impact-effort scoring. You'll learn how proofs-of-concept and guardrails help you to confidently expand your business, and how well-designed dashboards can provide early warnings so you can avoid any issues before they impact your customers. We use the HEART framework to align our product goals, fishbone diagrams to cut through complexity, prioritization scorecards to focus our energy where it matters, and monitoring setups to keep the team ahead of the curve.While the contexts vary, the lessons are universal.This book is for product managers who know that resilience isn't about avoiding problems-it's about being ready to handle them no matter where they come from. It's a shared strategy guide for those who want to lead with clarity when it matters most.Key LearningsTranslate complex data into clear insights that directly guide strategic product decisions under uncertainty.Build alignment through collaborative frameworks that unite product, engineering, and business teams on priorities.Apply sampling and estimation methods to make confident decisions even with incomplete or noisy datasets.Use structured prioritization techniques to maximize ROI while balancing speed, impact, and resource constraints.Implement early-warning dashboards that detect anomalies before customers experience a drop in service.Conduct root-cause analysis to uncover hidden issues that metrics alone may fail to reveal.Create lightweight proofs-of-concept to validate assumptions before committing resources to full-scale initiatives.Document and share decisions, assumptions, and learnings to maintain clarity across fast-moving teams.Blend operational and financial indicators to ensure product success is tied to tangible business outcomes.Develop resilience by anticipating failure modes and preparing mitigation tactics that can be deployed quickly.Table of ContentCrafting a Gadget-Sharing MarketplaceEmpowering Women via Mobile ExperienceElevating Post-Booking Airline ServicesOnboarding New Developers to Code PlatformMeasuring Pin Engagement for a Visual NetworkEstimating Search Volume for a Leading EngineReducing Flight-Cancellation Rates
Enter Prompt
India, the largest democracy and fastest-growing large economy in the world, faces unique challenges when it comes to the epochal AI. This scrupulously researched book, which includes interviews with practitioners, policymakers and tech evangelists, answers the questions every Indian today is grappling with. Steering clear of utopian hype and dystopian gloom, this book provides a balanced and nuanced understanding of AI's use cases and impact on our lives, livelihood and society.
Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet. The invented paradigm evolved into Spatial Grasp Technology and resulted in a European patent and eight books. The volumes covered concrete applications in graph and network theory, defense and social systems, crisis management, simulation of global viruses, gestalt theory, collective robotics, space research, and related concepts. The obtained solutions often exhibited high system qualities like global integrity, distributed awareness, and even consciousness. This current book takes these important characteristics as primary research objectives, together with the theory of patterns covering them all. This book is oriented towards system scientists, application programmers, industry managers, defense and security commanders, and university students (especially those interested in advanced MSc and PhD projects on distributed system management), as well as philosophers, psychologists, and United Nations personnel.
Extended Reality
The seven-volume set LNCS 15737-15743 constitutes the proceedings of the International Conference on Extended Reality, XR Salento 2025, held in Otranto, Italy, during June 17-20, 2025.The 128 full papers presented together with 65 short papers were carefully reviewed and selected from 256 submissions. The papers are organized in the following topical sections: Part I: Virtual Reality; and Augmented and Mixed Reality.Part II: Extended Reality; and Extended Reality in Education and Learning.Part III: Transforming Research and Clinical Interventions with eXtended Reality.Part IV: Digital Twin: Innovative Approaches in Industry and Healthcare.Part V: eXtended Reality for Cultural Tourism Sustainability; eXtended Reality for Art, Design, and Entertainment; and Digital Twin and Smart Virtual Representations for Cultural Heritage.Part VI: Crafting Virtual Humans for Immersive XR Applications; and eXtended Reality for Serious Games.Part VII: Artificial Intelligence; Integrating Artificial Intelligence, Computer Vision and Augmented Reality in Computer-Assisted Intervention; and AI-Driven XR Innovations in Healthcare: Bridging Technology and Ethics.
The Intelligence Explosion
With the rapid rise of generative artificial intelligence, both existential fears and uncritical enthusiasm for AI systems have surged. In this era of unprecedented technological growth, understanding the profound impacts of AI -- both positive and negative -- is more crucial than ever. In The Intelligence Explosion, James Barrat, a leading technology expert, equips readers with the tools to navigate the complex and often chaotic landscape of modern AI. This compelling book dives deep into the challenges posed by generative AI, exposing how tech companies have built systems that are both error-prone and impossible to fully interpret. Through insightful interviews with AI pioneers, Barrat highlights the unstable trajectory of AI development, showcasing its potential for modest benefits and catastrophic consequences. Bold, eye-opening, and essential, The Intelligence Explosion is a must-read for anyone grappling with the realities of the technological revolution.
The Cyber Shield
Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the door to a new threat, how can individuals and organizations protect themselves? This comprehensive guide to cybersecurity illuminates key concepts such as threat modelling, risk assessment, and the CIA triad (Confidentiality, Integrity, and Availability). With relatable scenarios and actionable best practices, it demystifies the various types of cyber threats, ranging from malware and phishing for login credentials to propaganda on social media fronts and ransomware. Including effective responses to successful attacks, case studies show the real-world impact of cybercrime and equip everyone from laypeople to experts with the digital literacy necessary to reclaim control in a perilous landscape.
Cloud Computing Security
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed to secure cloud platforms. Topics include cloud attack vectors, defence mechanisms, implementation challenges, and real-world case studies of major cloud service providers. Practical exercises and end-of-chapter questions reinforce key concepts, making this an essential resource. Designed for undergraduate and postgraduate students in computer science and cybersecurity, this book serves as a vital guide to securing cloud infrastructures and ensuring data integrity in a rapidly evolving technological landscape. Covers cloud security concepts, attack types, and defense mechanisms Includes cloud security tools, real-world case studies, and hands-on projects Discusses risk mitigation techniques and security best practices for cloud environments Examines real-world obstacles and solutions in cloud security adoption Analyses major cloud service providers and their security models
Blockchain Technology
This new volume explores the role of blockchain technology in promoting higher effectivenessin new business modeling in different industries, considering it as a key enabler of Industry 5.0solutions that incorporate lean, transparent, traceable, and trustworthy mechanisms not only inlogistics but also in other aspects of business processes.The volume looks at the incorporation of blockchain technology in conjunction with artificialintelligence in diverse business sectors. Chapters consider the use of blockchain technology inthe banking and finance sector; in the fashion industry; in the tourism, travel, and hospitalityindustries; in the national defense industry; for advertising and marketing; and, of course, inthe logistics industry for enhancing green supply chains with blockchain technology, where it isbeing used to bring new levels of trust between trading partners and to promote end-to-endvisibility.The volume looks at how blockchain technology is revolutionizing many industries by providingthe means to automate processes, eliminate intermediaries, and provide real-time data access, thus reducing administrative burdens, minimizing errors, and improving overall efficiency.
Computational Science and Computational Intelligence
The CCIS book constitutes selected papers accepted in the Research Track on Artificial Intelligence of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The 31 full papers included in this book were carefully reviewed and selected from a total of 383 submissions. They were organized in topical sections on prediction methods and novel applications; large language models, generative tools, speech recognition and applications; computational intelligence, machine learning, data science and applications; and artificial intelligence - ongoing research projects.
The Cyber Shield
Cyberattacks are on the rise in our hyper-digitized world. At a time when every click can open the door to a new threat, how can individuals and organizations protect themselves? This comprehensive guide to cybersecurity illuminates key concepts such as threat modelling, risk assessment, and the CIA triad (Confidentiality, Integrity, and Availability). With relatable scenarios and actionable best practices, it demystifies the various types of cyber threats, ranging from malware and phishing for login credentials to propaganda on social media fronts and ransomware. Including effective responses to successful attacks, case studies show the real-world impact of cybercrime and equip everyone from laypeople to experts with the digital literacy necessary to reclaim control in a perilous landscape.
Security and Privacy of Cyber-Physical Systems
This book examines vulnerability threats and attack detection and mitigation, including the associated legal requirements, regulatory frameworks, and policies for enabling the security and privacy of cyber-physical systems. It provides researchers, academics, and practitioners with new insights into the real-world scenarios of deploying, applying, and managing security and privacy frameworks in modern cyber-physical systems.It addresses critical security and privacy concerns, including theoretical analysis, novel system architecture design and implementation, vulnerability discovery, analysis, mitigation, emerging application scenarios, experimental frameworks, and social and ethical dilemmas affecting all parties in cyber-physical systems. The book is an ideal reference for practitioners and researchers in cyber-physical systems, security and privacy, the Internet of Things, advanced cryptography, cyber defensive walls, industrial systems, and cyber threats. It is also a suitable textbook for graduate and senior undergraduate courses in these subjects.
Artificial Intelligence
Named One of the Five Best Books on AI by The New York Times and The Wall Street Journal No technological development in recent history has generated as much excitement and terror--both utopian visions and apocalyptic nightmares--as artificial intelligence. Since generative AI and large language models exploded into our everyday lives in 2022 with the release of ChatGPT, AI has been the topic on everyone's mind. And the award-winning author and leading computer scientist Melanie Mitchell's acclaimed Artificial Intelligence: A Guide for Thinking Humans has been a touchstone for the debates. With a new preface situating the book in the context of AI's rapid progress, Artificial Intelligence offers an essential account of AI's turbulent history and an accessible explanation of the different kinds of AI: how they work, how they fail, and how they compare to human intelligence and understanding. Along the way, Mitchell introduces the dominant models of modern AI and machine learning, describing cutting-edge AI programs, their human inventors, and the historical lines of thought underpinning recent achievements. Raising big questions about the nature of intelligence itself, she consults with fellow experts and explores the profound disconnect between the hype and the actual achievements in AI, providing a clear sense of what the field has accomplished and how much further it has to go. Interweaving stories about the science of AI and the people behind it, Artificial Intelligence brims with clear-sighted and captivating accounts of the most interesting and provocative work in the field. This frank, lively book is an indispensable guide to understanding today's AI and its impact on the future for us all.
Sound Engineering Fundamentals - Mastering and Mixing
Mastering and Mixing Music is a comprehensive guide to the art of music production. From recording and editing to mixing and mastering, this book covers all aspects of creating professional-quality music. With tips and insights, you'll learn how to create your own unique sound and take your music to the next level. Whether you're a hobbyist or a professional, this book is an essential resource for anyone interested in music production.
Look Smarter Than You Are with Hyperion Planning
Oracle Hyperion Planning is the market leading budgeting and forecasting solution that provides powerful planning capabilities over the web and in Microsoft Excel. You want to plan faster and more accurately and you are sure Oracle Hyperion Planning is the answer. This book is your key to unlocking the world of Planning from an administrator perspective, guiding you through the ins and outs of Planning on your quest for improved budgeting and forecasting. You will learn: -What is Oracle Hyperion Planning and how to connect -How to plan over the web -How to build a Planning application from start to finish -The steps to manage and administer Planning applications -Tips, tricks, and design best practices for Planning and its underlying Essbase databases
International Conference on Smart Systems and Emerging Technologies
This book presents a groundbreaking compilation of cutting-edge research at the forefront of innovation, where artificial intelligence, machine learning, and advanced technologies converge to address real-world challenges with realistic solutions. This comprehensive book bridges theory and practice, offering transformative insights across diverse domains--from healthcare and cybersecurity to smart cities and language processing. Dive into pioneering advancements in Technology such as Arabic text-to-gloss machine translation, transformer-based image captioning, and GAN-enhanced privacy policies for constrained environments. Learn how deep learning revolutionizes cancer detection in medical imaging, optimizes traffic flow prediction, and refines speaker diarization in forensic audio. Immerse into ethical AI discussions, UAV navigation in GPS-denied terrains, and blockchain-secured voting systems, all while uncovering novel approaches to IoT security, cloud computing, and industrial efficiency. With contributions from leading researchers and practitioners, this book addresses critical topics like AI-driven sentiment analysis for business intelligence, self-supervised graph neural networks, and ethical implications of emerging technologies. Each chapter combines rigorous technical depth with actionable applications, making it an indispensable resource for researchers, engineers, and students eager to harness AI's potential in tackling modern global challenges.
Intelligent Approaches to Cyber Security
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.
Artificial Intelligence and Machine Learning for Smart Community
Intelligent systems are technologically advanced machines that perceive and respond to the world around them. Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications presents the evolution, challenges, and limitations of the application of machine learning and artificial intelligence to intelligent systems and smart communities. Covers the core and fundamental aspects of artificial intelligence, machine learning, and computational algorithms in smart intelligent systems Discusses the integration of artificial intelligence with machine learning using mathematical modeling Elaborates concepts like supervised and unsupervised learning, and machine learning algorithms, such as linear regression, logistic regression, random forest, and performance evaluation matrices Introduces modern algorithms such as convolutional neural networks and support vector machines Presents case studies on smart healthcare, smart traffic management, smart buildings, autonomous vehicles, smart education, modern community, and smart machines Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications is primarily written for graduate students and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology. Seasonal Blurb: This reference text presents the most recent and advanced research on the application of artificial intelligence and machine learning on intelligent systems. It will discuss important topics such as business intelligence, reinforcement learning, supervised learning, and unsupervised learning in a comprehensive manner.
Data Engineering for Cybersecurity
Turn raw logs into real intelligence. Security teams rely on telemetry--the continuous stream of logs, events, metrics, and signals that reveal what's happening across systems, endpoints, and cloud services. But that data doesn't organize itself. It has to be collected, normalized, enriched, and secured before it becomes useful. That's where data engineering comes in. In this hands-on guide, cybersecurity engineer James Bonifield teaches you how to design and build scalable, secure data pipelines using free, open source tools such as Filebeat, Logstash, Redis, Kafka, and Elasticsearch and more. You'll learn how to collect telemetry from Windows including Sysmon and PowerShell events, Linux files and syslog, and streaming data from network and security appliances. You'll then transform it into structured formats, secure it in transit, and automate your deployments using Ansible. You'll also learn how to: Encrypt and secure data in transit using TLS and SSHCentrally manage code and configuration files using GitTransform messy logs into structured eventsEnrich data with threat intelligence using Redis and MemcachedStream and centralize data at scale with KafkaAutomate with Ansible for repeatable deploymentsWhether you're building a pipeline on a tight budget or deploying an enterprise-scale system, this book shows you how to centralize your security data, support real-time detection, and lay the groundwork for incident response and long-term forensics.
Multimedia Data Processing and Computing
This book focuses on different applications of multimedia with supervised and unsupervised data engineering in the modern world. It includes AI-based soft computing and machine techniques in the field of medical diagnosis, biometrics, networking, manufacturing, data science, automation in electronics industries, and many more relevant fields.Multimedia Data Processing and Computing provides a complete introduction to machine learning concepts, as well as practical guidance on how to use machine learning tools and techniques in real-world data engineering situations. It is divided into three sections. In this book on multimedia data engineering and machine learning, the reader will learn how to prepare inputs, interpret outputs, appraise discoveries, and employ algorithmic strategies that are at the heart of successful data mining. The chapters focus on the use of various machine learning algorithms, neural net- work algorithms, evolutionary techniques, fuzzy logic techniques, and deep learning techniques through projects, so that the reader can easily understand not only the concept of different algorithms but also the real-world implementation of the algorithms using IoT devices. The authors bring together concepts, ideas, paradigms, tools, methodologies, and strategies that span both supervised and unsupervised engineering, with a particular emphasis on multimedia data engineering. The authors also emphasize the need for developing a foundation of machine learning expertise in order to deal with a variety of real-world case studies in a variety of sectors such as biological communication systems, healthcare, security, finance, and economics, among others. Finally, the book also presents real-world case studies from machine learning ecosystems to demonstrate the necessary machine learning skills to become a successful practitioner.The primary users for the book include undergraduate and postgraduate students, researchers, academicians, specialists, and practitioners in computer science and engineering.
Computational Science and Computational Intelligence
This CCIS book constitutes selected papers accepted in the Research Track on Internet of Things and Internet of Everything and the Research Track on Cloud Computing and Data Centers held as part of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The Research Track on Internet of Things and Internet, CSCI-RTOT, received 110 submissions of which 22 papers were accepted; 21 of those are included in this volume. For the Research Track on Cloud Computing and Data Centers, CSCI-RTCC, 7 papers were accepted from 36 submissions; 6 of those are included in this volume. The papers were organized in topical sections on Internet of Things and Applications; Internet of Things - Cloud Computing, Edge Computing; Communication Strategies and Applications.
Mastering Swift 6 - Seventh Edition
Become proficient in Swift 6 using advanced techniques and modern programming practices to effortlessly build high-performance applicationsKey Features: - Perfect your application development capabilities using the latest features of Swift 6.2- Learn advanced techniques like concurrency, memory management, Generics, and Swift Testing- Apply best practices in Swift to write clean, scalable, and maintainable code- Purchase of the print or Kindle book includes a free PDF eBookBook Description: This seventh edition of Mastering Swift 6 is your ultimate guide to harnessing the full power of Swift. Whether you're aiming to optimize the performance of your applications or looking to explore the exciting new features in Swift 6.2, this book has you covered. The author distills his 28 years of experience in the Engineering and IT fields to help you dive deep into advanced concepts and techniques, such as concurrency, memory management, and Generics, all essential for creating high-performance applications.The chapters take you on a flexible journey, covering Swift 6.2's newest features alongside advanced programming topics such as reflection, concurrency, and Generics. Packed with best practices, testing strategies, and modern programming techniques, this book equips you with the skills to develop scalable, high-performance applications with confidence.Whether you're looking to stay competitive or simply want to excel in Swift 6, this book provides the tools and knowledge you need to succeed.What You Will Learn: - Optimize your application's performance to meet the demands of the modern user- Develop readable, well-structured code by utilizing Swift development strategies- Use reflection with the Mirror API to observe your application's execution at runtime- Conquer advanced topics, such as concurrency, memory management, and generics- Find out how to use result builders and how to create custom operators in Swift- Effectively test your Swift code with the all-new Swift Testing frameworkWho this book is for: This book is for developers who have a fundamental grasp of the Swift language and aspire to take their development skills to the next level by learning about the advanced topics and techniques of the Swift language. All examples are compatible with Linux, in addition to the MacOS, iOS, iPadOS, VisionOS, and WatchOS platforms, unless otherwise noted.Table of Contents- The Evolution of Swift- Closures and Result Builders- Protocols and Protocol Extensions- Generics- Value and Reference Types- Enumerations- Reflection- Error Handling and Availability- Regular Expressions- Custom Subscripting- Property Observers and Wrappers- Dynamic Member Lookup and Key Paths- Grand Central Dispatch- Structured Concurrency- Memory Management- Advanced and Custom Operators- Access Controls- Swift Testing- Object-Oriented Programming- Protocol-Oriented Programming- Functional Programming with Swift
Polished Pages
If MS Word formatting has made you scream into your keyboard, you're in the right place.Whether you're submitting to an agent, preparing for self-publishing, or handing off your work to a book formatter, a clean, professional manuscript makes all the difference. Polished Pages walks you through a step-by-step checklist to tidy up your MS Word document-removing hidden formatting, fixing punctuation inconsistencies, standardizing styles, and resolving the quirks that build up over years of writing.Written with beginners in mind, this guide demystifies the technical side of Microsoft Word with clear instructions, helpful shortcuts, and practical tips. You'll learn how to navigate formatting marks, apply Word's built-in styles, use Find and Replace like a pro, and prep your manuscript for smooth conversion to both print and digital formats. No overwhelm. No jargon. Just clean, professional pages ready to impress.Wendy Spurlin is an editor, author, and writing coach who has spent over 40 years helping writers prepare their work for publication-with a special talent for making complex tech topics easy to understand.
Software Engineering: Emerging Trends and Practices in System Development
This book discovers peer-reviewed research from an international research conference that unites experts in software engineering, data science, artificial intelligence, cybernetics, and informatics. This book presents cutting-edge methods, practical case studies, and foundational advances that address real-world challenges across the computational spectrum. Whether you seek rigorous theory, proven development practices, or visionary perspectives on emerging technologies, this book provides a comprehensive resource for researchers, practitioners, and students committed to shaping the future of digital systems.
Computational Science and Computational Intelligence
This CCIS book constitutes selected papers accepted in the Research Track on Signal and Image Processing, Computer Vision and Pattern Recognition, and the Research Track on Parallel and Distributed Computing held as part of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The Research Track on ignal and Image Processing, Computer Vision and Pattern Recognition, CSCI-RTPD, received 108 submissions of which 21 papers were accepted. For the Research Track on Parallel and Distributed Computing, CSCI-RTPD, 7 papers were accepted from 30 submissions. They were organized in topical sections on signal and image processing, computer vision and pattern recognition; signal and image processing, and medical applications; parallel and distributed computing, HPC and applications; and ongoing research projects and posters.
Research Perspectives on Software Engineering and Systems Design
This book offers a broad range of ideas from CoMeSySo 2024, highlighting theory and practice in modern computing. Researchers from diverse backgrounds present their latest findings on systems design, software engineering, and innovative problem-solving. Topics include new methods to improve modeling, testing, and optimization across various fields. This book also shows how data-driven approaches and well-structured architectures can increase reliability. These proceedings foster meaningful teamwork and shared learning by bringing together experts from many areas. Readers will gain insights into advanced techniques that can be adapted to real-world situations. Industry specialists, academic researchers, and students will benefit from the breadth of approaches. Case studies reveal common hurdles and present workable solutions for upcoming challenges. With a clear focus on advancement, this resource is an essential guide to the next steps in computational development.
Software Engineering: Emerging Trends and Practices in System Development
This book discovers peer-reviewed research from an international research conference that unites experts in software engineering, data science, artificial intelligence, cybernetics, and informatics. This book presents cutting-edge methods, practical case studies, and foundational advances that address real-world challenges across the computational spectrum. Whether you seek rigorous theory, proven development practices, or visionary perspectives on emerging technologies, this book provides a comprehensive resource for researchers, practitioners, and students committed to shaping the future of digital systems.
The AI Advantage
Artificial Intelligence is no longer science fiction. It is here!Will you use AI to your advantage or will you fall behind?For decades, artificial intelligence has captured the human imagination-from sentient machines in science fiction to real-world breakthroughs that now shape our everyday lives. The AI Advantage offers readers a practical guide to understanding and using AI in a world that is rapidly transforming.This book, written by a team of AI experts from diverse fields including business, healthcare, education, cybersecurity, creative arts, and more, gives readers the clarity needed to thrive in the age of intelligent machines.The AI Advantage is a blueprint for personal and professional growth. Each chapter explores how AI tools are already reshaping industries, automating tasks, unlocking new creative possibilities, and enhancing decision-making. Whether you're a manager, entrepreneur, educator, student, or simply curious about what AI means for your life, this book helps you get started using AI tools that increase productivity, spark innovation, and create meaningful advantage in your work and daily routines.At a time when hype and fear often dominate the conversation around artificial intelligence, The AI Advantage offers a grounded, hopeful perspective. It doesn't promise utopia or predict doom-it gives you something far more valuable: a place to start.Discover what's possible, what's coming, and how to move forward with purpose in this new era. The AI Advantage is your invitation to stop watching the future happen-and start shaping it.The co-authors in this book include Heikki Almay, Nik Baker, Romit Bhatia, Sarah Choudhary, PhD, Pedro Clark Leite, Jingying Gao, PhD, Vivek Gnanavelu, Yuri Gubin, Julien Guille, Anil Hari, Ofer Hermoni, PhD, Maman Ibrahim, Anupriya Jain, Lydia James, Bridget Kovacs, Matt Kurleto, Arnaud Lucas, Samer Madfouni, Parul Malik, Nathaniel J. Melby, PhD, Kurt Mueller, Giorgio Natili, Lech Nowak, Rory O'Keeffe, Izak Oosthuizen, Elisa Phillips, Paul Powers, Gabriele Sangugino, Linda Sinisi, Greg Starling, Jodessiah Sumpter, Sakina Syed, and Ersin Uzun, PhD.
Building Effective Privacy Programs
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications Offers strategies to integrate privacy principles into business processes and IT systems Covers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actions Includes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.
Kickstart MySQL Fundamentals
Your Complete Guide to Mastering MySQL from Basics to Real Projects! Book DescriptionFrom powering web applications and content management systems to enterprise-level data storage, understanding MySQL is a foundational skill for anyone entering software development, data analysis, or IT. Kickstart MySQL Fundamentals is your step-by-step guide to becoming confident in relational database concepts and SQL programming. The book begins with the basics, such as- how to install MySQL, set up databases, and run your first queries. As you progress, you will explore constraints, operators, and built-in functions that form the core of practical SQL development. Moving into advanced territory, you will master joins, indexing for performance, and secure user management. Each chapter is filled with real-world examples and use cases to help solidify your understanding. A final capstone project brings all the concepts together in a hands-on, practical challenge that mimics real-world database tasks. Thus, whether you are a student, an aspiring developer, or IT professional, this book offers the essential foundation to manage and query databases effectively. So, do not get left behind-data skills are no longer optional. Start mastering MySQL today, and take control of your data future! Table of Contents1. Introduction to MySQL2. Getting Started with MySQL3. Constraints in MySQL4. Operators in MySQL5. MySQL Built-in Functions6. MySQL Statements7. MySQL Joins8. MySQL Indexes9. MySQL Users10. MySQL Advanced11. MySQL Miscellaneous12. Capstone Project Index
Microservices with Spring Boot and Spring Cloud - Fourth Edition
2025 EDITION: Create and deploy production-grade microservices-based applications with this edition fully updated to the latest versions of Spring Boot, Java, and Spring CloudKey Features: - Build cloud-native production-ready microservices and stay ahead of the curve- Understand the challenges of building large-scale microservice architectures- Learn how to get the best out of the latest updates, including Java, Spring Boot, Spring Cloud, Kubernetes, and Istio- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Do you want to build and deploy microservices but are unsure where to begin? Check out the fully updated 2025 edition of Microservices with Spring Boot and Spring Cloud.Drawing from Magnus' decades of experience, you'll start with simple microservices and progress to complex distributed applications, learning essential functionality and deploying microservices using Kubernetes and Istio along the way.This book covers Java 24, Spring Boot 3.5, and Spring Cloud 2025, featuring updated code examples and replacing deprecated APIs. You'll get a clear understanding of Spring's Ahead of Time (AOT) module, observability, distributed tracing, and Helm for Kubernetes packaging. The chapters show you how to use Docker Compose to run microservices with databases and messaging services and deploy microservices on Kubernetes with Istio. You'll also explore persistence, resilience, reactive microservices, and API documentation with OpenAPI, as well as learn service discovery with Netflix Eureka, edge servers with Spring Cloud Gateway, and monitoring with Prometheus, Grafana, and the EFK stack.By the end of this book, you'll be able to confidently build scalable microservices using Spring Boot and Spring Cloud.What You Will Learn: - Build reactive microservices using Spring Boot- Develop resilient and scalable microservices using Spring Cloud- Use OAuth and Spring Security to protect public APIs- Implement Docker to bridge the gap between development, testing, and production- Deploy and manage microservices with Kubernetes- Apply Istio for improved security, observability, and traffic management- Write and run automated microservice tests with JUnit, test containers, Gradle, and bash- Use Spring AOT and GraalVM to compile your microservices into native executables- Utilize Micrometer for distributed tracingWho this book is for: If you're a Java or Spring Boot developer learning how to build microservice landscapes from scratch, then this book is for you. Prior experience in building apps with Java or Spring Boot will help you get started with this book.Table of Contents- Introduction to Microservices- Introduction to Spring Boot- Creating a Set of Cooperating Microservices- Deploying Our Microservices Using Docker- Adding an API Description Using OpenAPI- Adding Persistence- Developing Reactive Microservices- Introduction to Spring Cloud- Adding Service Discovery Using Netflix Eureka- Using Spring Cloud Gateway to Hide Microservices behind an Edge Server- Securing Access to APIs- Centralized Configuration- Improving Resilience Using Resilience4j- Understanding Distributed Tracing- Introduction to Kubernetes- Deploying Our Microservices to Kubernetes- Implementing Kubernetes Features to Simplify the System Landscape- Using a Service Mesh to Improve Observability and Management- Centralized Logging with the EFK Stack- Monitoring Microservices- Installation Instructions for macOS(N.B. Please use the Read Sample option to see further chapters)
Science, Engineering Management and Information Technology
This book constitutes selected papers presented at the the 4th International Conference on Science, Engineering Management and Information Technology, SEMIT 2024, held in Ankara, Turkey, during September 12-13, 2024. The 27 full papers included in this book were carefully reviewed and selected from 123 submissions. These papers were organized in the following topical sections: Advances of AI/ML and Optimization in IT and Engineering; Novel AI Techniques in Healthcare and Medicine; Digital Technologies for Customer Service Orientation and Social Sustainability; Applications of AI/ML/DL in Traffic and Transportation Engineering.