PC Mag


Book Description

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.




PC Mag


Book Description

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.




Computerworld


Book Description

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.




Medical Image Computing and Computer-Assisted Intervention -- MICCAI 2009


Book Description

The two-volume set LNCS 5761 and LNCS 5762 constitute the refereed proceedings of the 12th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2009, held in London, UK, in September 2009. Based on rigorous peer reviews, the program committee carefully selected 259 revised papers from 804 submissions for presentation in two volumes. The first volume includes 125 papers divided in topical sections on cardiovascular image guided intervention and robotics; surgical navigation and tissue interaction; intra-operative imaging and endoscopic navigation; motion modelling and image formation; image registration; modelling and segmentation; image segmentation and classification; segmentation and atlas based techniques; neuroimage analysis; surgical navigation and robotics; image registration; and neuroimage analysis: structure and function.




The Selected Papers of Elizabeth Cady Stanton and Susan B. Anthony


Book Description

The “hush” of the title comes suddenly, when first Elizabeth Cady Stanton dies on October 26, 1902, and three years later Susan B. Anthony dies on March 13, 1906. It is sudden because Stanton, despite near blindness and immobility, wrote so intently right to the end that editors had supplies of her articles on hand to publish several months after her death. It is sudden because Anthony, at the age of eighty-five, set off for one more transcontinental trip, telling a friend on the Pacific Coast, “it will be just as well if I come to the end on the cars, or anywhere, as to be at home.” Volume VI of this extraordinary series of selected papers is inescapably about endings, death, and silence. But death happens here to women still in the fight. An Awful Hush is about reformers trained “in the school of anti-slavery” trying to practice their craft in the age of Jim Crow and a new American Empire. It recounts new challenges to “an aristocracy of sex,” whether among the bishops of the Episcopal church, the voters of California, or the trustees of the University of Rochester. And it sends last messages about woman suffrage. As Stanton wrote to Theodore Roosevelt on the day before she died, “Surely there is no greater monopoly than that of all men, in denying to all women a voice in the laws they are compelled to obey.” With the publication of Volume VI, this series is now complete.




The Finest Peaks


Book Description

This book challenges the precedent that a mountain's worth scales with height. It is a rational synthesis of new concepts that compel one to reassess the popular "heightist mindset". The concept of prominence, loosely defined as a mountain's vertical relief, is a stiff competitor to summit height for assessing a mountain's stature and relative worth for innumerable purposes. The community of prominence theoreticians, list builders, and climbers has reached critical mass - suggesting publication of a book dedicated exclusively to prominence. Revolutions are not overnight. The heightist mindset has minimally a 100 year head start. Eventually the climbing community will embrace prominence. For the mountaineer a prominence-based peak list provides fresh goals guaranteed to satisfy. A prominence-based peak list, regardless of geographic region, incorporates the most awe inspiring and diverse mountains. Chapter I introduces prominence, being defined and contrasted with altitude as peak list generator. Chapters II and III concern peak list production. Chapter IV reviews the history of prominence, including a compendium of prominence list builders and their lists. Chapter V is about prominence oriented peakbaggers and their accomplishments. Chapter VI entails prominence-derived mountain measures - submarine prominence, inverse prominence, proportional prominence, and dominance. Chapter VII concerns the advanced, prominence-derived concepts of parentage, divide trees, lineage cells, and more. Chapter VIII concerns alternative, objective mountain measures: isolation measure; peakedness and prominence density; and height / steepness combination measures - drop measure, cliff measure, spire measure, and ruggedness measure. Spire measure quantifies a mountain's subjective impressiveness due to great angularity. Chapter IX is a search for the largest prominence unclimbed mountain - grand goal of a future, summit-discovering expedition. Appendices A to G cover various subtopics, the glossary defines over 300 terms. 48 pages of illustrations are included, with full-color versions on-line at http://www.cohp.org/prominence/publication_2005_illustrations/main.html A beautiful, hardcover edition with color illustrations is available, and is highly recommended by book reviewers. ? E-mail the author for pricing and purchase information.




Who's in Charge Here?


Book Description

Few Americans are aware that their nation long ago created a separate government for education, supposedly to shield it from political interference. Some experts believe that at the heart of todays school debates is a push to put the larger government-- presidents, governors, mayors-- in the drivers seat, or even to dump democratic school governance entirely. The results are mixed. One clear result, however, is a vexing tangle of authority and accountability. "Whos in Charge Here?" untangles it all.




Cloud Security Handbook


Book Description

A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key FeaturesDiscover practical techniques for implementing cloud securityLearn how to secure your data and core cloud infrastructure to suit your business needsImplement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloudBook Description Securing resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds. This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. As you make progress, you'll implement security in small-scale cloud environments through to production-ready large-scale environments, including hybrid clouds and multi-cloud environments. This book not only focuses on cloud services in general, but it also provides actual examples for using AWS, Azure, and GCP built-in services and capabilities. By the end of this cloud security book, you'll have gained a solid understanding of how to implement security in cloud environments effectively. What you will learnSecure compute, storage, and networking services in the cloudGet to grips with identity management in the cloudAudit and monitor cloud services from a security point of viewIdentify common threats and implement encryption solutions in cloud servicesMaintain security and compliance in the cloudImplement security in hybrid and multi-cloud environmentsDesign and maintain security in a large-scale cloud environmentWho this book is for This book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, or cloud security professionals maintaining production environments in the cloud will also benefit from this book. Prior experience of deploying virtual machines, using storage services, and networking will help you to get the most out of this book.




Climate Change


Book Description

This book introduces climate change fundamentals and essential concepts that reveal the extent of the damage, the impacts felt around the globe, and the innovation and leadership it will take to bring an end to the status quo. Emphasizing peer-reviewed literature, this text details the impact of climate change on land and sea, the water cycle, human communities, the weather, and humanity’s collective future. Coverage of greenhouse gases, oceanic and atmospheric processes, Pleistocene and Holocene paleoclimate, sea levels, and other fundamental topics provide a deep understanding of key mechanisms, while discussion of extreme weather, economic impacts, and resource scarcity reveals how climate change is already impacting people’s lives—and will continue to do so at an increasing rate for the foreseeable future.




A Cost Model for Expressing and Estimating Ecological Costs of Software-Driven Systems


Book Description

The ecological footprint of our every day activities has become one of the greatest problems facing mankind today. Reducing the environmental footprint of IT, which has become a major contributor to green house gas emissions in the last decade, is therefore a major research challenge for both industry and academia. The focus of this book is to provide the foundation for expressing and estimating ecological costs of software systems in all life-cycle phases including the earliest phases of software development, thus helping all stakeholders make well-informed choices. In particular, common eco-cost drivers as well as new metrics are defined which allow meaningful and precise descriptions of ecological costs. Based on these concepts, auxiliary models are introduced which allow ecological costs and the circumstances causing them to be expressed in a unified, unambiguous, and easy-to-understand way. These models provide input to algorithmic eco-cost estimation models which show the impact of development decisions on ecological costs even in early phases of software development. Both the estimation and auxiliary models accommodate different input, allowing them to deliver the most accurate eco-cost estimates possible based on the information available. The approach presented in this book can therefore be used as the fulcrum of green software engineering methods to explore the eco-costs of applications' features and architectures at early stages in the development process before significant resources have been invested in their implementation. It therefore facilitates the creation of eco-friendlier software systems and by that contributing to the solution of one of the greatest problems facing mankind today.