Cyberbooks


Book Description

Computer genius Carl Lewis has invented the "Cyberbook", an electronic device that instantly and inexpensively brings the written word to the masses. But not everyone warms to Carl's ideas. Add corporate spies, authors threatening to strike, and a wave of mysterious murders, and you have Ben Bova at his best.




InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.




Artificial Intelligence in STEM Education


Book Description

Artificial intelligence (AI) opens new opportunities for STEM education in K-12, higher education, and professional education contexts. This book summarizes AI in education (AIED) with a particular focus on the research, practice, and technological paradigmatic shifts of AIED in recent years. The 23 chapters in this edited collection track the paradigmatic shifts of AIED in STEM education, discussing how and why the paradigms have shifted, explaining how and in what ways AI techniques have ensured the shifts, and envisioning what directions next-generation AIED is heading in the new era. As a whole, the book illuminates the main paradigms of AI in STEM education, summarizes the AI-enhanced techniques and applications used to enable the paradigms, and discusses AI-enhanced teaching, learning, and design in STEM education. It provides an adapted educational policy so that practitioners can better facilitate the application of AI in STEM education. This book is a must-read for researchers, educators, students, designers, and engineers who are interested in the opportunities and challenges of AI in STEM education.




Ballistic Missile Defense Organization


Book Description

Highlights 50 of Ballistic Missile Defense Organization's (BMDO) best success stories emerging from technology transfer in the past year. Covers technologies such as: communications and displays, computer hardware and software, manufacturing, materials, medicine, optics, sensors, and dual-use technologies. Also discusses the program's integrated efforts to support BMDO-funded technologies at various stages of development through the following approaches: making industry aware of BMDO-funded innovations, guiding researchers in the commercialization process, leveraging coop. relationships; and testing innovative models to commercialize BMDO-funded technology.




How to Publish and Promote Online


Book Description

Everything you need to know about profitable online publishing and promotion From Stephen King to authors who haven't become household names quite yet, authors are increasingly turning to the Internet as a way of taking charge of their own publishing destiny. The opportunities are vast, but also confusing: Should you publish an e-book, a conventional print book, a Print On Demand book, a CD-ROM, or all of the above? What do you need to know to create an e-book? How do you set up a website, and how can you actually get people to visit that website? Where can you sell your books on the web? And how can you use the Internet to generate massive free publicity? M. J. Rose and Angela Adair-Hoy provide the answers to all of these questions and more. When she self-published her first novel, Lip Service, as an e-book, M. J. Rose became a "cyber pioneer" (PW Daily) and attracted so much publicity that she sold the rights to a major book club and a New York publisher. As the co-owner of a highly successful e-book publisher, Booklocker, and the publisher of Writers Weekly, an e-magazine featuring markets for freelance writers, Angela Adair-Hoy also learned all of the possibilities that online publishing could offer. Using their own experiences-combined with insiders' tips from other authors on the web-they published an e-book, The Secrets of Our Success, that became the underground bible for online authors and publishers. Now thoroughly revised and expanded, this book is an indispensable guide to navigating the publishing jungle from you own personal computer.




Ballistic Missile Defense Organization


Book Description

Highlights 50 of Ballistic Missile Defense Organization's best success stories emerging from technology transfer in the past year. Covers technologies such as: medicine, environment, sensor, energy, the information superhighway, software, microelectronics, superconductors, and dual-use technologies, Photos.







Laugh Lines


Book Description

Space: The Funniest Frontier! Ben Bova, SF master humorist You'd better believe it! A supersonic zeppelin. The "Crisis of the Month" Oz, revealed. A foray into a future where publishing is literally cut-throat. A raucous horde of hard SF legend Ben Bova's most amusing and imaginative novels and tales! At the publisher's request, this title is sold without DRM (Digital Rights Management). "Bova gets better and better..."¾Los Angeles Daily News.




Challenges


Book Description

Bova offers a new collection of wide-ranging science fiction stories, essays about the onrushing future, and observations about the craft of SF itself. Included - among others - are such tales as the touching "The Man Who Hated Gravity," the satirical "Crisis of the Month" and "Fitting Suits," rigorously hard SF like "To Touch a Star," and wrenching drama like "Answer, Please Answer" and "Brothers." Framing all the stories are Bova's insights into the challenges posed in the writing of each one, a vade mecum of home truths about the science in SF, trusting one's own instincts, writing what you know, dealing with publishers, generating plots, creating sympathetic characters, and getting the job done. Also included is a remarkable pair of pieces, one a speculative essay about the world of fifty years hence ("2042: A Cautiously Pessimistic View") and the other a novella, Thy Kingdom Come, set in the world outlined in that essay and dramatizing its problems and opportunities. Finally, Challenges also presents a generous selection of Bova's output as an essayist both in and outside the SF field, such pieces as "Will Writing Survive?," "Science in Science Fiction," "What Works for Me - And What I Work For," "John Campbell and the Modern SF Idiom," and his resounding affirmation of humanistic rationalism, "Science, Fiction and Faith." Any collection of Ben Bova's fiction would be cause for celebration. With its generous helping of Bova's comments - particular, provocative, and deeply practical - on the SF field itself and the real future into which we are all embarked, Challenges is an even more special book for SF readers, aspiring writers, and anyone interested in where the human race is headed at the end of the twentieth century At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




Cybersecurity - Attack and Defense Strategies


Book Description

Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system Book DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.What you will learn Learn the importance of having a solid foundation for your security posture Understand the attack strategy using cyber security kill chain Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Learn how to perform an incident investigation Get an in-depth understanding of the recovery process Understand continuous security monitoring and how to implement a vulnerability management strategy Learn how to perform log analysis to identify suspicious activities Who this book is for This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.