Author: Kohei Arai
Publisher: Springer Nature
ISBN: 3030731006
Category : Technology & Engineering
Languages : en
Pages : 1125
Book Description
This book aims to provide an international forum for scholarly researchers, practitioners and academic communities to explore the role of information and communication technologies and its applications in technical and scholarly development. The conference attracted a total of 464 submissions, of which 152 submissions (including 4 poster papers) have been selected after a double-blind review process. Academic pioneering researchers, scientists, industrial engineers and students will find this series useful to gain insight into the current research and next-generation information science and communication technologies. This book discusses the aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of things, from classical to intelligent scope. The authors hope that readers find the volume interesting and valuable; it gathers chapters addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of the future research.
Advances in Information and Communication
Author: Kohei Arai
Publisher: Springer Nature
ISBN: 3030731006
Category : Technology & Engineering
Languages : en
Pages : 1125
Book Description
This book aims to provide an international forum for scholarly researchers, practitioners and academic communities to explore the role of information and communication technologies and its applications in technical and scholarly development. The conference attracted a total of 464 submissions, of which 152 submissions (including 4 poster papers) have been selected after a double-blind review process. Academic pioneering researchers, scientists, industrial engineers and students will find this series useful to gain insight into the current research and next-generation information science and communication technologies. This book discusses the aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of things, from classical to intelligent scope. The authors hope that readers find the volume interesting and valuable; it gathers chapters addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of the future research.
Publisher: Springer Nature
ISBN: 3030731006
Category : Technology & Engineering
Languages : en
Pages : 1125
Book Description
This book aims to provide an international forum for scholarly researchers, practitioners and academic communities to explore the role of information and communication technologies and its applications in technical and scholarly development. The conference attracted a total of 464 submissions, of which 152 submissions (including 4 poster papers) have been selected after a double-blind review process. Academic pioneering researchers, scientists, industrial engineers and students will find this series useful to gain insight into the current research and next-generation information science and communication technologies. This book discusses the aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of things, from classical to intelligent scope. The authors hope that readers find the volume interesting and valuable; it gathers chapters addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of the future research.
SQL Server 2019 Administrator's Guide
Author: Marek Chmel
Publisher: Packt Publishing Ltd
ISBN: 1789950333
Category : Computers
Languages : en
Pages : 522
Book Description
Use Microsoft SQL Server 2019 to implement, administer, and secure a robust database solution that is disaster-proof and highly available Key FeaturesExplore new features of SQL Server 2019 to set up, administer, and maintain your database solution successfullyDevelop a dynamic SQL Server environment and streamline big data pipelinesDiscover best practices for fixing performance issues, database access management, replication, and securityBook Description SQL Server is one of the most popular relational database management systems developed by Microsoft. This second edition of the SQL Server Administrator's Guide will not only teach you how to administer an enterprise database, but also help you become proficient at managing and keeping the database available, secure, and stable. You’ll start by learning how to set up your SQL Server and configure new and existing environments for optimal use. The book then takes you through designing aspects and delves into performance tuning by showing you how to use indexes effectively. You’ll understand certain choices that need to be made about backups, implement security policy, and discover how to keep your environment healthy. Tools available for monitoring and managing a SQL Server database, including automating health reviews, performance checks, and much more, will also be discussed in detail. As you advance, the book covers essential topics such as migration, upgrading, and consolidation, along with the techniques that will help you when things go wrong. Once you’ve got to grips with integration with Azure and streamlining big data pipelines, you’ll learn best practices from industry experts for maintaining a highly reliable database solution. Whether you are an administrator or are looking to get started with database administration, this SQL Server book will help you develop the skills you need to successfully create, design, and deploy database solutions. What you will learnDiscover SQL Server 2019’s new features and how to implement themFix performance issues by optimizing queries and making use of indexesDesign and use an optimal database management strategyCombine SQL Server 2019 with Azure and manage your solution using various automation techniquesImplement efficient backup and recovery techniques in line with security policiesGet to grips with migrating, upgrading, and consolidating with SQL ServerSet up an AlwaysOn-enabled stable and fast SQL Server 2019 environmentUnderstand how to work with Big Data on SQL Server environmentsWho this book is for This book is for database administrators, database developers, and anyone who wants to administer large and multiple databases single-handedly using Microsoft's SQL Server 2019. Basic awareness of database concepts and experience with previous SQL Server versions is required.
Publisher: Packt Publishing Ltd
ISBN: 1789950333
Category : Computers
Languages : en
Pages : 522
Book Description
Use Microsoft SQL Server 2019 to implement, administer, and secure a robust database solution that is disaster-proof and highly available Key FeaturesExplore new features of SQL Server 2019 to set up, administer, and maintain your database solution successfullyDevelop a dynamic SQL Server environment and streamline big data pipelinesDiscover best practices for fixing performance issues, database access management, replication, and securityBook Description SQL Server is one of the most popular relational database management systems developed by Microsoft. This second edition of the SQL Server Administrator's Guide will not only teach you how to administer an enterprise database, but also help you become proficient at managing and keeping the database available, secure, and stable. You’ll start by learning how to set up your SQL Server and configure new and existing environments for optimal use. The book then takes you through designing aspects and delves into performance tuning by showing you how to use indexes effectively. You’ll understand certain choices that need to be made about backups, implement security policy, and discover how to keep your environment healthy. Tools available for monitoring and managing a SQL Server database, including automating health reviews, performance checks, and much more, will also be discussed in detail. As you advance, the book covers essential topics such as migration, upgrading, and consolidation, along with the techniques that will help you when things go wrong. Once you’ve got to grips with integration with Azure and streamlining big data pipelines, you’ll learn best practices from industry experts for maintaining a highly reliable database solution. Whether you are an administrator or are looking to get started with database administration, this SQL Server book will help you develop the skills you need to successfully create, design, and deploy database solutions. What you will learnDiscover SQL Server 2019’s new features and how to implement themFix performance issues by optimizing queries and making use of indexesDesign and use an optimal database management strategyCombine SQL Server 2019 with Azure and manage your solution using various automation techniquesImplement efficient backup and recovery techniques in line with security policiesGet to grips with migrating, upgrading, and consolidating with SQL ServerSet up an AlwaysOn-enabled stable and fast SQL Server 2019 environmentUnderstand how to work with Big Data on SQL Server environmentsWho this book is for This book is for database administrators, database developers, and anyone who wants to administer large and multiple databases single-handedly using Microsoft's SQL Server 2019. Basic awareness of database concepts and experience with previous SQL Server versions is required.
Microsoft Exchange Server 2019 Administration Guide
Author: Edward van Biljon
Publisher: BPB Publications
ISBN: 939068451X
Category : Computers
Languages : en
Pages : 269
Book Description
Manage Exchange 2019 single-handed and empower your organization with secure communications KEY FEATURESÊÊ _ Uncover the latest features in Exchange Server 2019 and learn to make use of it. _ Expert techniques to manage databases, file management, and improve search. _ Cutting-edge coverage on MAPI and Exchange Management Shell (EMS). DESCRIPTIONÊ Prepare your environment so you can introduce Exchange Server 2019 or build a new environment from scratch and learn along the way. This guide will help the readers how to deploy Exchange 2019 and perform all the post administrative tasks like creating a certificate request that you can submit to an external source and completing this setup. You will learn how to configure your virtual directories to match the name on your certificate. You will also learn how to build your first Database Availability Group (DAG) or extend the Database Availability Groups in your environment to ensure you have high availability. You will learn how to perform mailbox moves from your existing Exchange environment or simply create new mailboxes for your users. You can do all your tasks using the Exchange Management Shell (EMS) and learn about the new features of Exchange 2019 and the next version of Exchange. In this administration guide, you will learn about Exchange 2019, what is new, and what has been removed. You will learn how to deploy Exchange 2019, configure it and understand what is required to run in coexistence with Exchange 2013 or Exchange 2016. Lastly, you will learn how to work with the Exchange Management Shell compared to the Exchange Admin Center. WHAT YOU WILL LEARN _ Learn how to install Exchange 2019 in a new environment and in a coexistence environment. _ Learn how to work with Database Availability Groups (DAG) and implement them. _ Learn how to perform migrations from Exchange 2013 or Exchange 2016 to Exchange 2019. WHO THIS BOOK IS FORÊÊ This book is a go-to-guide for System Administrators, Windows Administrators, Network Administrators, System Engineers who plays key role in managing the infrastructure and support of the business communication throughout the company. Sound knowledge of email client and basic use of windows exchange server is expected to make the best use of this book. TABLE OF CONTENTS 1. Introduction to Exchange 2019 2. Installation of Exchange 2019 3. Post Configuration 4. Post Configuration Continued 5. Client Connectivity 6. Databases and Database Availability Groups 7. Public Folders 8. Migrations 9. Coexistence with Exchange 2013/2016 10. Exchange Management Shell and Extras
Publisher: BPB Publications
ISBN: 939068451X
Category : Computers
Languages : en
Pages : 269
Book Description
Manage Exchange 2019 single-handed and empower your organization with secure communications KEY FEATURESÊÊ _ Uncover the latest features in Exchange Server 2019 and learn to make use of it. _ Expert techniques to manage databases, file management, and improve search. _ Cutting-edge coverage on MAPI and Exchange Management Shell (EMS). DESCRIPTIONÊ Prepare your environment so you can introduce Exchange Server 2019 or build a new environment from scratch and learn along the way. This guide will help the readers how to deploy Exchange 2019 and perform all the post administrative tasks like creating a certificate request that you can submit to an external source and completing this setup. You will learn how to configure your virtual directories to match the name on your certificate. You will also learn how to build your first Database Availability Group (DAG) or extend the Database Availability Groups in your environment to ensure you have high availability. You will learn how to perform mailbox moves from your existing Exchange environment or simply create new mailboxes for your users. You can do all your tasks using the Exchange Management Shell (EMS) and learn about the new features of Exchange 2019 and the next version of Exchange. In this administration guide, you will learn about Exchange 2019, what is new, and what has been removed. You will learn how to deploy Exchange 2019, configure it and understand what is required to run in coexistence with Exchange 2013 or Exchange 2016. Lastly, you will learn how to work with the Exchange Management Shell compared to the Exchange Admin Center. WHAT YOU WILL LEARN _ Learn how to install Exchange 2019 in a new environment and in a coexistence environment. _ Learn how to work with Database Availability Groups (DAG) and implement them. _ Learn how to perform migrations from Exchange 2013 or Exchange 2016 to Exchange 2019. WHO THIS BOOK IS FORÊÊ This book is a go-to-guide for System Administrators, Windows Administrators, Network Administrators, System Engineers who plays key role in managing the infrastructure and support of the business communication throughout the company. Sound knowledge of email client and basic use of windows exchange server is expected to make the best use of this book. TABLE OF CONTENTS 1. Introduction to Exchange 2019 2. Installation of Exchange 2019 3. Post Configuration 4. Post Configuration Continued 5. Client Connectivity 6. Databases and Database Availability Groups 7. Public Folders 8. Migrations 9. Coexistence with Exchange 2013/2016 10. Exchange Management Shell and Extras
A Comprehensive Guide to 5G Security
Author: Madhusanka Liyanage
Publisher: John Wiley & Sons
ISBN: 1119293049
Category : Technology & Engineering
Languages : en
Pages : 482
Book Description
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Publisher: John Wiley & Sons
ISBN: 1119293049
Category : Technology & Engineering
Languages : en
Pages : 482
Book Description
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Advances in Cyber Security Analytics and Decision Systems
Author: Shishir K. Shandilya
Publisher: Springer Nature
ISBN: 3030193535
Category : Technology & Engineering
Languages : en
Pages : 153
Book Description
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Publisher: Springer Nature
ISBN: 3030193535
Category : Technology & Engineering
Languages : en
Pages : 153
Book Description
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Planning and Promoting Events in Health Sciences Libraries
Author: Shalu Gillum
Publisher: Rowman & Littlefield
ISBN: 1538135914
Category : Language Arts & Disciplines
Languages : en
Pages : 167
Book Description
Library programming can increase patron awareness of and engagement with library resources and services. However, creative programming and promotion is what really draws people in, especially as libraries evolve and become more virtual. How can librarians reach their unique user groups when those users never have to step foot in the library? Planning and Promoting Events in Health Sciences Libraries: Success Stories and Best Practices presents a simple blueprint for planning and promoting library events and programs written with medical librarians in mind. Whether you work in an academic or hospital setting, this book is full of useful suggestions and tips for taking the stress and confusion out of the library programming and event planning process. Drawing upon the wisdom and experience of health sciences librarians from across the country, this book will: Walk readers through the stages of library programming and promotion Act as a how-to for health sciences librarians looking to create successful outreach events Highlight how other health sciences libraries just like yours have successfully created programs for their users, even those with little to no programming budget Encourage readers to think creatively about their own programming and events Planning and Promoting Events in Health Sciences Libraries: Success Stories and Best Practices will show you that you don’t need a degree in marketing in order to create successful outreach events. Health sciences librarians can take what they already know about their patrons and their own libraries and apply that knowledge to every planning process with the help of the practical strategies found in this guide.
Publisher: Rowman & Littlefield
ISBN: 1538135914
Category : Language Arts & Disciplines
Languages : en
Pages : 167
Book Description
Library programming can increase patron awareness of and engagement with library resources and services. However, creative programming and promotion is what really draws people in, especially as libraries evolve and become more virtual. How can librarians reach their unique user groups when those users never have to step foot in the library? Planning and Promoting Events in Health Sciences Libraries: Success Stories and Best Practices presents a simple blueprint for planning and promoting library events and programs written with medical librarians in mind. Whether you work in an academic or hospital setting, this book is full of useful suggestions and tips for taking the stress and confusion out of the library programming and event planning process. Drawing upon the wisdom and experience of health sciences librarians from across the country, this book will: Walk readers through the stages of library programming and promotion Act as a how-to for health sciences librarians looking to create successful outreach events Highlight how other health sciences libraries just like yours have successfully created programs for their users, even those with little to no programming budget Encourage readers to think creatively about their own programming and events Planning and Promoting Events in Health Sciences Libraries: Success Stories and Best Practices will show you that you don’t need a degree in marketing in order to create successful outreach events. Health sciences librarians can take what they already know about their patrons and their own libraries and apply that knowledge to every planning process with the help of the practical strategies found in this guide.
Essentials of Business Communication
Author: Mary Ellen Guffey
Publisher: South Western Educational Publishing
ISBN: 9780324233643
Category : Business communication
Languages : en
Pages : 0
Book Description
This text-workbook is a streamlined, no-nonsense approach to business communication. It takes a three-in-one approach: (1) text, (2) practical workbook, and (3) self-teaching grammar/mechanics handbook. The chapters reinforce basic writing skills, then apply these skills to a variety of memos, letters, reports, and resumes. This new edition features increased coverage of contemporary business communication issues including oral communication, electronic forms of communication, diversity and ethics.
Publisher: South Western Educational Publishing
ISBN: 9780324233643
Category : Business communication
Languages : en
Pages : 0
Book Description
This text-workbook is a streamlined, no-nonsense approach to business communication. It takes a three-in-one approach: (1) text, (2) practical workbook, and (3) self-teaching grammar/mechanics handbook. The chapters reinforce basic writing skills, then apply these skills to a variety of memos, letters, reports, and resumes. This new edition features increased coverage of contemporary business communication issues including oral communication, electronic forms of communication, diversity and ethics.
Guide for BBA/BBS/BBM 2021
Author: Arihant Experts
Publisher: Arihant Publications India limited
ISBN: 9325290820
Category :
Languages : en
Pages : 643
Book Description
• This book is an ultimate guide for BBA/ BBS/ BBM entrances • The entire syllabus of has been divided into 6 main section and further into chapter • 2 Section Tests is carried after every section • More than 3000 MCQs have been provided for quick revision of concept • 5 Previous Years’ Solved Question Papers [2019- 2015] for complete practice • 3 Cracked Sets are given for self evaluation • Answer to Section Tests and Crack Sets provided at the end of the book BBA/BBM/BMS are 3 years full time Under-Graduated Management programmes that instill the basics of running business operation in a student. Various management Universities/ institutions like AIMA-UGAT, Delhi University, Symbiosis Pune, GGSIPU, Jamia Millia, etc., conduct entrances exams for the above cited bachelor courses “The Ultimate Guide for the BBA/BMS/BBM Entrance Examination 2021” provides a structured and comprehensive approach towards learning the concepts. The book covers the entire syllabus under 6 sections and also provides ample number of questions in the form of Section tests, MCQs and Solved papers with well-detailed answers to analyze the paper pattern. In order to get self-evaluated, 3 Crack Sets are provided for additional practice. TABLE OF CONTENT Solved Paper 2020 & 2019 , Numerical Ability, Reasoning and Logical Deduction, Corporate GK (With Question Bank), General Awareness, English Language & Comprehension, Group Discussion & Personal Interview, Crack Sets (1-3), Answer to Section Tests and Crack Sets.
Publisher: Arihant Publications India limited
ISBN: 9325290820
Category :
Languages : en
Pages : 643
Book Description
• This book is an ultimate guide for BBA/ BBS/ BBM entrances • The entire syllabus of has been divided into 6 main section and further into chapter • 2 Section Tests is carried after every section • More than 3000 MCQs have been provided for quick revision of concept • 5 Previous Years’ Solved Question Papers [2019- 2015] for complete practice • 3 Cracked Sets are given for self evaluation • Answer to Section Tests and Crack Sets provided at the end of the book BBA/BBM/BMS are 3 years full time Under-Graduated Management programmes that instill the basics of running business operation in a student. Various management Universities/ institutions like AIMA-UGAT, Delhi University, Symbiosis Pune, GGSIPU, Jamia Millia, etc., conduct entrances exams for the above cited bachelor courses “The Ultimate Guide for the BBA/BMS/BBM Entrance Examination 2021” provides a structured and comprehensive approach towards learning the concepts. The book covers the entire syllabus under 6 sections and also provides ample number of questions in the form of Section tests, MCQs and Solved papers with well-detailed answers to analyze the paper pattern. In order to get self-evaluated, 3 Crack Sets are provided for additional practice. TABLE OF CONTENT Solved Paper 2020 & 2019 , Numerical Ability, Reasoning and Logical Deduction, Corporate GK (With Question Bank), General Awareness, English Language & Comprehension, Group Discussion & Personal Interview, Crack Sets (1-3), Answer to Section Tests and Crack Sets.
Cybersecurity in Context
Author: Chris Jay Hoofnagle
Publisher: John Wiley & Sons
ISBN: 1394262442
Category : Computers
Languages : en
Pages : 548
Book Description
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.
Publisher: John Wiley & Sons
ISBN: 1394262442
Category : Computers
Languages : en
Pages : 548
Book Description
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.
Program Evaluation Theory and Practice
Author: Donna M. Mertens
Publisher: Guilford Press
ISBN: 1462503241
Category : Social Science
Languages : en
Pages : 642
Book Description
This engaging text takes an evenhanded approach to major theoretical paradigms in evaluation and builds a bridge from them to evaluation practice. Featuring helpful checklists, procedural steps, provocative questions that invite readers to explore their own theoretical assumptions, and practical exercises, the book provides concrete guidance for conducting large- and small-scale evaluations. Numerous sample studies—many with reflective commentary from the evaluators—reveal the process through which an evaluator incorporates a paradigm into an actual research project. The book shows how theory informs methodological choices (the specifics of planning, implementing, and using evaluations). It offers balanced coverage of quantitative, qualitative, and mixed methods approaches. Useful pedagogical features include: *Examples of large- and small-scale evaluations from multiple disciplines. *Beginning-of-chapter reflection questions that set the stage for the material covered. *"Extending your thinking" questions and practical activities that help readers apply particular theoretical paradigms in their own evaluation projects. *Relevant Web links, including pathways to more details about sampling, data collection, and analysis. *Boxes offering a closer look at key evaluation concepts and additional studies. *Checklists for readers to determine if they have followed recommended practice. *A companion website with resources for further learning.
Publisher: Guilford Press
ISBN: 1462503241
Category : Social Science
Languages : en
Pages : 642
Book Description
This engaging text takes an evenhanded approach to major theoretical paradigms in evaluation and builds a bridge from them to evaluation practice. Featuring helpful checklists, procedural steps, provocative questions that invite readers to explore their own theoretical assumptions, and practical exercises, the book provides concrete guidance for conducting large- and small-scale evaluations. Numerous sample studies—many with reflective commentary from the evaluators—reveal the process through which an evaluator incorporates a paradigm into an actual research project. The book shows how theory informs methodological choices (the specifics of planning, implementing, and using evaluations). It offers balanced coverage of quantitative, qualitative, and mixed methods approaches. Useful pedagogical features include: *Examples of large- and small-scale evaluations from multiple disciplines. *Beginning-of-chapter reflection questions that set the stage for the material covered. *"Extending your thinking" questions and practical activities that help readers apply particular theoretical paradigms in their own evaluation projects. *Relevant Web links, including pathways to more details about sampling, data collection, and analysis. *Boxes offering a closer look at key evaluation concepts and additional studies. *Checklists for readers to determine if they have followed recommended practice. *A companion website with resources for further learning.