Title

Title
Bienvenue sur Biblio-Sciences, site communautaire principalement destiné aux étudiants, élèves et à toute autre personne désirant trouver des documents numériques dans un but académique, ludique ou autre. Explorez Biblio-Sciences où chaque livre est une aventure scientifique qui commence. La connaissance n'attend que vous !

Search

Rechercher des livres par catégories

togglesFiltrer
Affichage des articles dont le libellé est TECHNOLOGIE. Afficher tous les articles
Affichage des articles dont le libellé est TECHNOLOGIE. Afficher tous les articles

Artificial intelligence and literary creativity: inside the mind of BRUTUS, a storytelling machine

Author(s):Selmer Bringsjord, David Ferrucci
Collection:
Publisher: L. Erlbaum Associates
Year:2000
Langue: English
Pages: 230 pages
Size:1.78 MB
Extension:PDF


[tab] [content title="Summary"] **Description:** Is human creativity something AI can never replicate? Many people believe that while AI systems may match or exceed human expertise in specific domains, true feats of brilliance—those that require creativity—will always be beyond the grasp of machines. However, this book challenges that assumption. The authors aim to push artificial intelligence toward a future where machines can not only generate basic text, but create first-rate fiction that rivals the work of human geniuses. This book chronicles five years of work on *BRUTUS.1*, a story-generating system that was designed to explore the boundaries of machine creativity. The authors delve into the technical and philosophical aspects of their project, which was driven by three main goals: 1. **Theoretical Exploration**: To answer the age-old question of whether humans are fundamentally different from machines. Can machines, with the right programming, replicate the emotional depth and innovative thought that is typically associated with human creativity? 2. **Challenging Conventional Wisdom**: To challenge the belief that creativity is inherently outside the scope of logic. The authors aim to bridge the gap between the logical operations of machines and the emotional, intuitive realm of human creativity. 3. **Practical Application**: To lay the groundwork for the future of AI as a creative partner. Machines capable of producing high-level creative works could significantly enhance human endeavors in fields such as literature, art, and innovation. In this book, readers will discover the results of the BRUTUS.1 project and the broader implications of AI's role in creativity. It's a thought-provoking exploration for anyone interested in the intersection of technology and the arts, as well as those curious about the potential of AI to collaborate with humans in creative fields. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Artificial intelligence and literary creativity: insnoide the mind of BRUTUS, a storytelling machine EBOOK PDF EPUB DJVU . Download Artificial intelligence and literary creativity: inside the mind of BRUTUS, a storytelling machine EBOOK PDF EPUB DJVU .

Clustering: A Data Recovery Approach, Second Edition

Author(s):Boris Mirkin (Author)
Collection:
Publisher:Chapman and Hall/CRC
Year:2013
Langue: English
Pages: 340 pages
Size:1.59 MB
Extension:PDF


[tab] [content title="Summary"] Clustering is often regarded more as an art than a science, with many books on the subject focusing on learning through examples, where techniques are often selected through trial and error. Even the two most widely used and closely related clustering methods—K-Means for partitioning and Ward's method for hierarchical clustering—have traditionally lacked the strong theoretical foundation required for a deeper understanding of their application and effectiveness. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Clustering: A Data Recovery Approach, Second Edition EBOOK PDF EPUB DJVU . Download Clustering: A Data Recovery Approach, Second Edition EBOOK PDF EPUB DJVU .

Dark World: A Book on the Deep Dark Web

Author(s):Atif Ali, Muhammad Qasim
Collection:
Publisher:CRC Press
Year:2023
Langue: English
Pages: 280 pages
Size:61.52 MB
Extension:PDF


[tab] [content title="Summary"] Cybercrimes on the Dark Web represent a significant and growing concern, as this hidden part of the Internet serves as a platform for a wide range of illegal activities. The Dark Web, accessible only through specialized software like Tor, provides anonymity and privacy, making it an attractive space for individuals involved in illicit activities. Here's a breakdown of some common cybercrimes on the Dark Web, how people are conducting business there, and the areas most heavily focused on: ### **Cybercrimes on the Dark Web** 1. **Illegal Drug Trade** The Dark Web has become a major marketplace for the sale and distribution of illegal drugs. Websites and marketplaces such as AlphaBay (which was shut down in 2017) and Silk Road (the original, which was dismantled by law enforcement) were prominent examples of such trade. Users can purchase drugs from anywhere in the world, with transactions often involving cryptocurrencies like Bitcoin to ensure anonymity. Law enforcement agencies worldwide have made significant efforts to dismantle these marketplaces, but new ones continue to emerge. 2. **Weapons and Explosives** The Dark Web is also a platform for the illegal sale of firearms, explosives, and other weapons. Though these markets are not as prevalent as drug markets, they still pose significant risks to public safety. Firearms and other illegal items are often sold through encrypted communication channels, allowing sellers to evade detection by authorities. 3. **Stolen Data and Identity Theft** Personal and financial data, including stolen credit card details, bank account information, and social security numbers, are commonly traded on the Dark Web. Cybercriminals often acquire this information through data breaches, phishing attacks, or hacking and then sell it to other criminals or use it for identity theft. This type of crime has a direct impact on individuals and businesses, leading to financial losses and privacy violations. 4. **Hacking Services and Malware** The Dark Web hosts a variety of services that cater to hackers. These include access to malware, ransomware, and denial-of-service (DDoS) attack tools, as well as services offered by "hackers-for-hire." Criminals can purchase hacking tools or even hire others to conduct cyberattacks, including corporate espionage, financial fraud, or political cyberattacks. 5. **Human Trafficking and Exploitation** Unfortunately, the Dark Web is also a venue for human trafficking, exploitation, and the sale of child sexual abuse material (CSAM). These heinous crimes are some of the most disturbing activities taking place in this space. Law enforcement agencies and international organizations are working together to combat human trafficking on the Dark Web, but it remains a significant challenge. 6. **Counterfeit Currency and Documents** Counterfeit money, fake passports, driver’s licenses, and other forged documents are frequently bought and sold on the Dark Web. Criminals involved in money laundering or other illegal activities often rely on counterfeit documents to conceal their identity or actions. 7. **Fraudulent Services and Scams** Fraudulent services such as fake online reviews, phishing kits, and fraudulent e-commerce schemes are common on the Dark Web. Scammers also sell fake or fraudulent services, which can be used for social engineering, identity theft, or to trick unsuspecting individuals or businesses into losing money. ### **How People Are Doing Business on the Dark Web** - **Cryptocurrencies** Cryptocurrencies, especially Bitcoin and Monero, are the primary method of payment on the Dark Web. They allow for pseudonymous transactions that are difficult to trace, making them ideal for criminal enterprises. Cryptocurrencies offer a high degree of privacy, which is critical for both buyers and sellers engaged in illicit activities. - **Encrypted Communication** To ensure privacy and avoid detection by law enforcement, users on the Dark Web rely heavily on encrypted communication channels. Services like PGP (Pretty Good Privacy) for email encryption and encrypted messaging platforms like Signal or Wickr are commonly used to communicate securely. - **Decentralized Marketplaces** Many Dark Web marketplaces operate in a decentralized manner, with multiple vendors selling a variety of illegal goods and services. Some marketplaces are short-lived, as they are regularly taken down by law enforcement or exit scams by the administrators. New ones are frequently created, often using the Tor network to ensure anonymity. - **Escrow Systems** To mitigate the risks of fraud, many Dark Web marketplaces use an escrow system for transactions. When a buyer purchases an item, the payment is held in escrow by the platform until the goods are received. This system helps protect both buyers and sellers, though it does not eliminate the risk of scams. ### **Areas Most Focused on the Dark Web** - **Cybercrime and Hacking Tools** A large portion of the Dark Web is dedicated to the sale of hacking tools, malware, ransomware, and services. This includes tools for launching cyberattacks, cracking passwords, stealing data, and infiltrating networks. As the sophistication of these tools increases, they pose a growing threat to both individuals and organizations. - **Drug and Weapon Trade** While the drug trade is one of the most widely known Dark Web markets, the sale of weapons and explosives also receives significant attention. This includes firearms, ammunition, and dangerous substances. Despite international law enforcement efforts, these markets continue to operate and evolve. - **Human Trafficking** While it is a less visible crime, human trafficking is a disturbing focus on the Dark Web. Criminals use the anonymity of the platform to traffic people for exploitation, forced labor, and sex trafficking. - **Financial Fraud and Data Breaches** The Dark Web is a hub for the exchange of stolen data, particularly financial information. Credit card details, login credentials, and other personal information are bought and sold, fueling fraud and identity theft. Hackers may also offer “forged documents,” which can be used for illegal activities like money laundering. ### **Objective and Target Audience of the Book** The book’s primary objective is to present an interdisciplinary, easily understandable guide to the Dark Web, making it accessible for a broad audience interested in understanding its implications, challenges, and risks. By covering a wide range of topics—technical, social, legal, and ethical—the book aims to bridge the gap between technical experts, law enforcement, policymakers, and the general public. The research and findings presented in this book will be beneficial to several key groups: - **Security Agencies**: Law enforcement and cybersecurity agencies will find valuable insights into the Dark Web’s criminal activities, which could help in developing strategies for monitoring, investigating, and dismantling illicit networks. - **Security Professionals**: Cybersecurity experts can use this book as a resource to understand emerging threats from the Dark Web and how to defend against them. - **Counter-Terrorism Experts**: Since the Dark Web is often used for organizing and funding illicit and terrorist activities, counter-terrorism specialists can benefit from understanding the platform’s role in global security issues. - **Policymakers**: Legislators and policymakers need to understand the social, economic, and political implications of the Dark Web to create informed, effective regulations and laws that can address the challenges of anonymity, privacy, and cybercrime. By providing a comprehensive and accessible analysis of the Dark Web, this book seeks to equip readers with the knowledge necessary to navigate and address the challenges posed by this hidden digital underworld. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Dark World: A Book on the Deep Dark Web EBOOK PDF EPUB DJVU . Download Dark World: A Book on the Deep Dark Web EBOOK PDF EPUB DJVU .

The Internet In Everything: Freedom And Security In A World With No Off Switch

Author(s):Laura DeNardisss
Collection:
Publisher:Yale University Press
Year:2020
Langue: English
Pages: 282 pages
Size:2.58 MB
Extension:PDF


[tab] [content title="Summary"] In *The Internet of Things: Threatening Human Rights and Security*, Laura DeNardis presents a compelling argument that the rapid expansion of the Internet into everyday objects and systems poses significant risks to both human rights and global security. The so-called "Internet of Things" (IoT) now connects everything from cars to medical devices to household appliances, blurring the lines between the physical and virtual worlds. While the social and economic benefits of this interconnectedness are vast, DeNardis highlights the darker side: an outage in cyberspace can result not only in lost communication but also in catastrophic consequences, including potential loss of life. The control over this vast network has become a new form of political power, as countries can now reach across borders to disrupt real-world infrastructure. DeNardis argues that the integration of the Internet into the fabric of the physical world dramatically amplifies governance concerns, particularly around issues of privacy, discrimination, public safety, democracy, and national security. She suggests that as technology becomes ever more embedded in our daily lives, the invisible power structures and technical governance systems that shape it will play an increasingly critical role in defining the future. In response to these concerns, she proposes new cyber-policy solutions that are necessary to safeguard our rights and security in this interconnected world. DeNardis emphasizes the need to address the hidden technical governance frameworks that will become the constitutional foundation of the IoT age. Through her work, she makes visible the often-overlooked forces shaping our digital future, urging policymakers to act before these unseen structures of power solidify further. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger The Internet In Everything: Freedom And Security In A World With No Off Switch EBOOK PDF EPUB DJVU . Download The Internet In Everything: Freedom And Security In A World With No Off Switch EBOOK PDF EPUB DJVU .

Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

Author(s):Alex Alexandrou
Collection:
Publisher:CRC Press
Year:2021
Langue: English
Pages: 338 pages
Size:33.24 MB
Extension:PDF


[tab] [content title="Summary"] **Cybercrime and Information Technology: Theory and Practice** – *The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices* is an introductory textbook that delves into the latest technologies, trends, and security challenges. While many books focus on investigations, forensic recovery, and evidence presentation, or others cover computer and network security, this book takes a comprehensive approach by addressing both areas. It explains the fundamental principles governing computers, wireless and mobile devices, the Internet of Things (IoT), cloud systems, and their associated vulnerabilities. Only by understanding these concepts can students fully grasp the security challenges and opportunities related to cybercrime—challenges that cannot be uncovered, investigated, or adjudicated unless they are properly understood. The legal portion of the book provides an overview of the U.S. legal system, including cyberlaws, regulations, and standards impacting cybercrime. This section also includes ongoing cases that are shaping legal precedents. New technologies often necessitate new laws and regulations, a process that is frequently slower than the rapid pace of technological advancement. ### Key Features: - **Foundational Cybercrime Knowledge:** Offers a solid grounding in cybercrime, along with key concepts in networking, computer security, the Internet of Things (IoT), and mobile devices. - **Legal Insights:** Discusses essential legal statutes and precedents related to investigative and forensic issues, including evidence collection and preservation. - **Emerging Security Challenges:** Identifies the new security concerns associated with technologies such as mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the IoT. - **In-depth Cybersecurity Understanding:** Enhances students' understanding of the fundamentals of computer and network security, topics that are often overlooked in many textbooks, while also addressing cybercrime as an important aspect of future cybersecurity challenges. *Cybercrime and Information Technology* is an invaluable addition to the literature, especially for professors seeking a practical, forward-thinking approach to emerging technologies and trends. The book is particularly suitable for forensic science courses in computer science and criminal justice programs, especially those focusing on digital evidence and investigation. It is also applicable to courses in Computer Forensics, Criminal Justice, Security Administration, Public Administration, Police Studies, Business Administration, Computer Science, and Information Systems. An Instructor’s Manual with a Test Bank and chapter PowerPoint slides is available to qualified instructors for use in classroom teaching. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices EBOOK PDF EPUB DJVU . Download Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices EBOOK PDF EPUB DJVU .

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

Author(s):Fei Hu
Collection:
Publisher:CRC Press
Year:2016
Langue: English
Pages: 604 pages
Size:11.92 MB
Extension:PDF


[tab] [content title="Summary"] The Internet of Things (IoT) has generated significant interest from both academia and industry. Unfortunately, it has also caught the attention of hackers. *Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations* brings together leading IoT security experts from around the globe, who share their expertise on various aspects of IoT security. The book addresses the question: "How can we use efficient models, algorithms, and implementations to address the four critical aspects of IoT security: confidentiality, authentication, integrity, and availability?" The book is organized into five sections covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first section introduces the different types of IoT attacks and threats and explains countermeasure principles for defending against these threats. It provides in-depth discussions of specific attacks such as malware propagation and Sybil attacks. The second section focuses on privacy preservation related to the collection and distribution of data, including medical records. The author uses smart buildings as a case study to explore privacy protection solutions. The third section examines various trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication challenges. The fourth section highlights security issues related to IoT data processing. It covers computational security concerns in IoT data handling, security design for time series data aggregation, key generation for data transmission, and specific security protocols for data access. The final section explores policy and human behavior aspects, addressing social-context-based privacy and trust design in IoT platforms, as well as policy-driven informed consent in the IoT ecosystem. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations EBOOK PDF EPUB DJVU . Download Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations EBOOK PDF EPUB DJVU .

Information Technology and Lawyers: Advanced Technology in the Legal Domain, from Challenges to Daily Routine

Author(s): Arno R. Lodder, Anja Oskamp
Collection:
Publisher:Springer
Year:2006
Langue: English
Pages: 198 pages
Size:6.65 MB
Extension:PDF


[tab] [content title="Summary"] The intersection of Information Technology and law is a truly captivating field, offering vast opportunities from both practical and academic standpoints. The potential for applying Information Technology to the legal profession is immense. However, it is worth noting that lawyers are traditionally among the more conservative professionals and tend to be slow adopters of new technologies. That said, the gap between Information Technology and the legal field is gradually narrowing, particularly due to the rise of the Internet and the wealth of legal resources now available online. This book aims to help bridge this gap by introducing legal professionals to the possibilities of Information Technology, both in the present and the near future. It also introduces IT professionals to the opportunities within the legal domain. Any lawyer interested in understanding the current application of IT in legal practice, and what can be expected in the near future, should find this book invaluable. Targeted at both practitioners and academics, this book is also well-suited for (post)graduate courses in computer science, law, business, and related fields. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Information Technology and Lawyers: Advanced Technology in the Legal Domain, from Challenges to Daily Routine EBOOK PDF EPUB DJVU . Download Information Technology and Lawyers: Advanced Technology in the Legal Domain, from Challenges to Daily Routine EBOOK PDF EPUB DJVU .

How To Get To The Top Of Google in 2020: The Plain English Guide to SEO

PDF
Author(s):Tuxford, Andrew, Davies, Dale, Cameron-Kitchen, Tim
Collection:
Publisher:
Year:2020
Langue: English
Pages: 230 pages
Size:6.17 MB
Extension:PDF


[tab] [content title="Summary"] Here's a reformulated version of the text in English, maintaining the original content: --- Join over 10,000 business owners and marketers who have used this bestselling, no-nonsense SEO book to boost their rankings and increase their sales. Whether you’ve tried SEO in the past without seeing much success, are a complete SEO beginner looking to capture a significant share of search rankings, or you're an experienced professional wanting to stay current with the best SEO practices, this book is for you. Imagine being able to... - Understand how Google decides which websites to rank? - Know exactly which keywords to target to attract customers ready to buy what you sell? - See your most profitable keywords rise to the top spot? - Confidently tweak your website structure (without needing any technical expertise) for fast results? - Write content that Google and your visitors love? - Build relationships with key industry players and have them begging for your content? - Create a complete SEO strategy to focus your efforts and achieve big results? What kind of results can you expect? One of our clients came to us in 2015 making just $2k a month in sales and was thinking about closing the business. Today, that same business generates $3.4 million per month, thanks to the strategies in this book. You’ll read about this success story and others in the book. Every strategy is data-driven and battle-tested by the Exposure Ninja team, who help real businesses like yours grow. A free gift before we begin... **How Easy Is It to Rank?** **How to Use This Book** **The Structure of This Book** **This Book Wasn't Written by a Single Author** ### Section 1: The Foundations **Chapter 1**: Four Free Ways to Appear on the First Page of Google - Method 1: Google Organic Results - Method 2: Featured Snippets - Method 3: Google Local - Method 4: Using Other People's Websites **Chapter 2**: How Google Decides Where to Rank You and Your Competitors - Ranking Pillar 1: Relevance - Ranking Pillar 2: Popularity and Authority - Ranking Pillar 3: Quality **Chapter 3**: How to Find and Rank for the Most Profitable Keywords - Step-by-step process for discovering and targeting profitable keywords **Chapter 4**: Analyzing Your Competitors and Identifying Their Strengths and Weaknesses - Pro tips for understanding your competitors’ SEO success **Chapter 5**: Introduction to Backlinks ### Section 2: Your Website **Chapter 6**: Website Optimization **Chapter 7**: Domains and URLs - Key myths about Exact Match Domains (EMDs) - TLDs and URL separators explained **Chapter 8**: How to Structure a Top-Ranking Website **Chapter 9**: Sitemaps **Chapter 10**: One Website or Multiple? **Chapter 11**: Website Usability and Performance **Chapter 12**: Mobile Optimization **Chapter 13**: How to Write for Google and Profit - What makes good content, how to avoid mistakes like duplicate content, and optimizing your site for SEO **Chapter 14**: How to Use Knowledge Bases and FAQs to 10x Your Organic Traffic **Chapter 15**: How to Use Your Blog to Actually Make Money **Chapter 16**: Behind-the-Scenes Optimization - Title tags, meta descriptions, meta keywords, and schema markup for SEO **Chapter 17**: Website Speed Hacks **Chapter 18**: Google Search Console ### Section 3: Promoting Your Website **Chapter 19**: Link Acquisition Basics **Chapter 20**: Good Links vs. Bad Links **Chapter 21**: Online Directories **Chapter 22**: Video Links **Chapter 23**: Introduction to Content Marketing **Chapter 24**: How to Get Featured on the World’s Biggest Websites Through Digital PR - Using PR for free advertising and lead generation **Chapter 25**: How to Run Your Own Data Outreach Study **Chapter 26**: Blogger and Influencer Outreach **Chapter 27**: How to Get Influencers to Promote Your Business **Chapter 28**: How to Use Inbound PR Requests to Get Featured in Top-Tier Publications for Free **Chapter 29**: Using Social Media to Boost Your SEO ### Section 4: Designing and Implementing Your SEO Strategy **Chapter 30**: How to Plan an SEO Strategy **Chapter 31**: How to Measure Your Progress - Tracking keywords and rankings **Chapter 32**: Outsourcing vs. DIY **Chapter 33**: Additional Help and Advice --- This version retains all the original content while presenting it in a more concise, easy-to-read format with clear section titles. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger How To Get To The Top Of Google in 2020: The Plain English Guide to SEO EBOOK PDF EPUB DJVU . Download How To Get To The Top Of Google in 2020: The Plain English Guide to SEO EBOOK PDF EPUB DJVU .

Electronics Bionics for the Evil Genius 25 Build-It-Yourself Projects

PDF
Author(s):Newton C. Braga
Collection:
Publisher:McGraw-Hill
Year:2006
Langue: English
Pages: 204 pages
Size:18.77 MB
Extension:PDF


[tab] [content title="Summary"] [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Electronics Bionics for the Evil Genius 25 Build-It-Yourself Projects EBOOK PDF EPUB DJVU . Download Electronics Bionics for the Evil Genius 25 Build-It-Yourself Projects EBOOK PDF EPUB DJVU .

22 Radio and Receiver Projects for the Evil Genius

PDF
Author(s):Thomas Petruzzellis
Collection:
Publisher:McGraw-Hill/TAB Electronics
Year:2007
Langue: English
Pages: 299 pages
Size:7.8 MB
Extension:MB


[tab] [content title="Summary"] It looks like you're sharing a description of the book *22 Radio Receiver Projects for the Evil Genius* by Thomas Petruzzellis. Here's a summary of the book based on the details you've provided: --- **Title:** *22 Radio Receiver Projects for the Evil Genius* **Author:** Thomas Petruzzellis **Publisher:** The McGraw-Hill Companies, Inc. **Year:** 2008 **Pages:** 299 **Format:** PDF **Size:** 7.9 MB **Quality:** Excellent **Language:** English **Description:** This book offers a comprehensive guide to building radio receivers for various applications. It provides step-by-step instructions for assembling and understanding radio circuits, similar to the *"Useful Circuits – Receivers"* series. The author, Thomas Petruzzellis, is a geophysics engineer at the New York University geophysical laboratory and a writer for many well-known technical journals in the U.S. The book is aimed at amateur radio enthusiasts and hobbyists, offering a mix of practical radio projects. These include both theoretical background and practical schematics, with plenty of diagrams and circuit layouts to guide the reader. It's a great resource for those looking to learn more about radio technology and experimenting with radio projects on their own. --- Let me know if you want help with anything specific from the book or any further questions! [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger 22 Radio and Receiver Projects for the Evil Genius EBOOK PDF EPUB DJVU . Download 22 Radio and Receiver Projects for the Evil Genius EBOOK PDF EPUB DJVU .

Build your own Blockchain: Make your own blockchain and trading bot on your pc

PDF
Author(s):Magelan Cybersecurity
Collection:
Publisher:Books on Demand
Year:2021
Langue: English
Pages: pages
Size:1.43 MB
Extension:EPUB


[tab] [content title="Summary"] In this book, you will discover how to create your own blockchain on your computer, even if you're an absolute beginner, and connect it to a smart contract (trading bot). [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Build your own Blockchain: Make your own blockchain and trading bot on your pc EBOOK PDF EPUB DJVU . Download Build your own Blockchain: Make your own blockchain and trading bot on your pc EBOOK PDF EPUB DJVU .

Excel 2007 VBA Programmer's Reference

Author(s):John Green, Stephen Bullen, Rob Bovey, Michael Alexander
Collection:
Publisher:Wiley / Wrox
Year:2007
Langue: English
Pages: 1179 pages
Size:6.79 MB
Extension:PDF


[tab] [content title="Summary"] Prepare to elevate your Excel applications by leveraging the power of the VBA language. This comprehensive resource will empower you to take control of your spreadsheets using VBA, enabling you to create more dynamic Excel applications for other users. Covering everything from foundational concepts to advanced developer topics, it provides thorough guidance on all aspects of Excel 2007, including the Ribbon interface and XML file formats. Whether you're just starting or looking to enhance your skills, this resource is designed to help you navigate and master Excel's capabilities. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Excel 2007 VBA Programmer's Reference EBOOK PDF EPUB DJVU . Download Excel 2007 VBA Programmer's Reference EBOOK PDF EPUB DJVU .

Essentials of Computer Organization and Architecture

PDF
Author(s):Linda Null
Collection:
Publisher:Jones & Bartlett Publishers
Year:2018
Langue: English
Pages: 776 pages
Size:17.80 MB
Extension:PDF


[tab] [content title="Summary"] "The Essentials of Computer Organization and Architecture" has been honored with a "Textbook Excellence Award" (or "Texty") for its second, third, and fourth editions by the Text and Academic Authors Association (TAA), the sole organization dedicated to supporting textbook and academic authors since 1987 (www.TAAonline.net). This award recognizes outstanding works based on content quality, presentation, appeal, and teachability. Each new print copy of "Essentials of Computer Organization and Architecture" includes Navigate 2 Advantage Access, which unlocks a comprehensive and interactive eBook, along with student practice activities, assessments, a complete suite of instructor resources, and learning analytics tools. The bestselling "Essentials of Computer Organization and Architecture, Fifth Edition" is thorough enough to cover all necessary topics while remaining concise enough for a single-term course. It emphasizes real-world examples and practical applications, helping students gain a "big-picture" understanding of how key concepts in organization and architecture are implemented in computing. This text aligns with ACM/IEEE guidelines and provides insights into the inner workings of modern digital computers through an integrated approach to fundamental concepts and principles. With Navigate 2, technology and content come together to enhance your classroom experience. Whether you teach online, in a hybrid format, or in traditional settings, Navigate 2 offers exceptional value. Discover more at www.jblnavigate.com/2. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Essentials of Computer Organization and Architecture EBOOK PDF EPUB DJVU . Download Essentials of Computer Organization and Architecture EBOOK PDF EPUB DJVU .

TECHN

PDF
Author(s):Mark Richards
Collection:
Publisher:O'Reilly
Year:2015
Langue: English
Pages: 47 pages
Size:5.28 MB
Extension:PDF


[tab] [content title="Summary"] "Just as developers rely on design patterns in software development, architects utilize well-defined architecture patterns to shape and characterize their designs. Choosing the wrong architecture pattern—or failing to use one—can lead to significant issues, resulting in an architecture that fails to meet requirements. Therefore, it’s essential for architects to be familiar with and understand the various architecture patterns available. In this webcast, I will explore several common architecture patterns, including traditional layered architecture, microservices architecture, space-based architecture, event-driven architecture, and microkernel architecture. I will present real-world examples to illustrate how each pattern operates and outline their advantages and disadvantages. Additionally, I will discuss how requirements and operational considerations influence the choice of patterns. Selecting the right architecture pattern for your system is crucial, as we know that once established, changing the architecture can be very challenging." [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Software Architecture Patterns EBOOK PDF EPUB DJVU . Download Software Architecture Patterns EBOOK PDF EPUB DJVU .

Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures

PDF
Author(s):Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures
Collection:
Publisher:O'Reilly Media
Year:2021
Langue: English
Pages: 462 pages
Size:15.74 MB
Extension:PDF


[tab] [content title="Summary"] Making decisions in software architecture is rarely straightforward. Instead, you'll encounter numerous challenging issues and problems without clear best practices, compelling you to navigate various compromises. This book equips you with the skills to critically evaluate the trade-offs associated with distributed architectures. Experienced consultants Neal Ford, Mark Richards, Pramod Sadalage, and Zhamak Dehghani share strategies for selecting the right architecture. They weave a narrative featuring a fictional team of tech professionals—the Sysops Squad—covering a wide range of topics, including service granularity, workflow and orchestration management, contract decoupling, distributed transaction management, and optimizing operational characteristics like scalability, elasticity, and performance. By addressing frequently asked questions, this book offers techniques to help you identify and evaluate the trade-offs you’ll face as an architect, including: * Analyzing trade-offs and effectively documenting your decisions * Making informed choices about service granularity * Understanding the challenges of decomposing monolithic applications * Managing and decoupling contracts between services * Handling data within a highly distributed architecture * Learning patterns to manage workflows and transactions when separating applications [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures EBOOK PDF EPUB DJVU . Download Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures EBOOK PDF EPUB DJVU .

Fundamentals of Software Architecture: An Engineering Approach

PDF
Author(s):Mark Richards, Neal Ford
Collection:
Publisher:O'Reilly Media
Year:2020
Langue: English
Pages: 500 pages
Size:52.90 MB
Extension:EPUB


[tab] [content title="Summary"] Salary surveys consistently rank the role of software architect among the top 10 best jobs globally, yet there has been a lack of comprehensive guidance for developers aspiring to become architects. This book fills that gap by providing an in-depth overview of the various facets of software architecture. Both aspiring and current architects will delve into topics such as architectural characteristics, patterns, component identification, diagramming and presenting architecture, evolutionary architecture, and more. Mark Richards and Neal Ford, experienced practitioners who have taught software architecture classes for years, emphasize principles that are applicable across different technology stacks. This book offers a contemporary perspective on software architecture, reflecting on the innovations of the past decade. Key topics covered include: * **Architecture Patterns:** The technical foundation for numerous architectural decisions. * **Components:** Addressing identification, coupling, cohesion, partitioning, and granularity. * **Soft Skills:** Focusing on effective team management, meetings, negotiation, presentations, and additional interpersonal skills. * **Modern Practices:** Engineering methodologies and operational strategies that have undergone significant change in recent years. * **Architecture as an Engineering Discipline:** Emphasizing repeatable outcomes, metrics, and concrete evaluations that enhance the rigor of software architecture. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Fundamentals of Software Architecture: An Engineering Approach EBOOK PDF EPUB DJVU . Download Fundamentals of Software Architecture: An Engineering Approach EBOOK PDF EPUB DJVU .

Software Engineering at Google

PDF
Author(s):Hyrum Wright, Tom Manshreck, Titus Winters
Collection:
Publisher:
Year:2020
Langue: English
Pages: 617 pages
Size:7.45 MB
Extension:PDF


[tab] [content title="Summary"] How do you maintain a dynamic codebase that adapts to evolving requirements over time? Drawing from their experience at Google, software engineers Titus Winters and Hyrum K. Wright, along with technical writer Tom Manshreck, offer an honest and insightful perspective on how some of the industry's top professionals build and sustain software. At Google, approximately 80-90% of the work involves software engineering, while only 10-20% is dedicated to new programming. Most education on this topic tends to focus on programming itself, often neglecting the broader aspects of software engineering. This book highlights three essential principles that software organizations should consider when designing, architecting, and coding: * The key distinctions between software engineering and programming * The software engineering lifecycle, from development and testing to deprecation * Strategies for effectively managing your codebase and adapting to changes * The significance of culture, along with the roles of processes, practices, and tools * Trade-offs: how organizations make informed software decisions by considering time and scale [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Software Engineering at Google EBOOK PDF EPUB DJVU . Download Software Engineering at Google EBOOK PDF EPUB DJVU .

The Complete Guide to Wiring: Current with 2017-2020 Electrical Codes, Updated 7th Ed.

PDF
Author(s):Black & Decker Corporation
Collection:
Publisher:Black & Decker Corporation
Year:2018
Langue: English
Pages: 338 pages
Size:141.33 MB
Extension:PDF


[tab] [content title="Summary"] [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger The Complete Guide to Wiring: Current with 2017-2020 Electrical Codes, Updated 7th Ed. EBOOK PDF EPUB DJVU . Download The Complete Guide to Wiring: Current with 2017-2020 Electrical Codes, Updated 7th Ed. EBOOK PDF EPUB DJVU .

Google semantic search: search engine optimization (SEO) techniques that get your company more traffic, increase brand impact, and amplify your online presence

PDF
Author(s): Amerland, Dave
Collection:
Publisher: Que
Year:2014
Langue: English
Pages: 229 pages
Size:5.33 MB
Extension:PDF


[tab] [content title="Summary"] David Amerland provides a clear explanation of concepts like the Knowledge Graph (TM), TrustRank (TM), AuthorityRank (TM), personalized and mobile search, as well as social media activity, in this straightforward book aimed at helping readers stay ahead in SEO techniques. Drawing from his deep understanding of Google's inner workings and its latest patents, he also highlights the increasing influence of social networks on SEO performance. This book is targeted at business professionals rather than tech experts and offers easy-to-follow guidance that reflects the radical changes happening at Google and beyond. The content covers topics such as: What is semantic search? What is the Knowledge Graph? What’s new in SEO? Trust and author rank. What is TrustRank? How content became marketing. Social media marketing and semantic search. There is no longer a "first" page on Google. The spread of influence and semantic search. Entity extraction and the semantic web. The four Vs of semantic search. How search became invisible. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger Google semantic search: search engine optimization (SEO) techniques that get your company more traffic, increase brand impact, and amplify your online presence EBOOK PDF EPUB DJVU . Download Google semantic search: search engine optimization (SEO) techniques that get your company more traffic, increase brand impact, and amplify your online presence EBOOK PDF EPUB DJVU .

How to Be Good at Science, Technology, and Engineering

PDF
Author(s):DK
Collection:
Publisher:Dorling Kindersley Ltd
Year:2018
Langue: English
Pages: 320 pages
Size:43.79 MB
Extension:PDF


[tab] [content title="Summary"] Young scientists will grasp scientific concepts in no time with this essential homework aid. Explore topics ranging from molecules and magnetism to rockets and radio waves. Discover how hot-air balloons ascend, how erosion shapes mountains, how light waves travel through space, and how the human eye perceives color! With STEM (science, technology, engineering, and mathematics) becoming increasingly vital in today's tech-driven world, "How to Be Good at Science, Technology, and Engineering" serves as the ideal book to inspire and educate curious young minds, equipping them for the future. This comprehensive homework guide covers all core areas of the science curriculum, making it perfect for both parents and children. Engaging illustrations demonstrate the application of science in everyday life, showing how microchips, tractors, and suspension bridges operate. The book also includes hands-on projects featuring fun experiments to try at home or school, like polishing old coins with vinegar or creating an erupting volcano using baking soda. [/content] [content title="Content"] [/content] [content title="Author(s)"] [/content] [/tab]


[facebook src="bibliosciencesorg"/]


Key-Words: Télécharger EBOOK PDF EPUB DJVU How to Be Good at Science, Technology, and Engineering. Download EBOOK PDF EPUB DJVU How to Be Good at Science, Technology, and Engineering.

Accueil Page suivante

Post Share Buttons

Les plus populaires Voir la suite