Mostrando 1,461 - 1,480 Resultados de 2,031 Para Buscar '"The Social Network"', tiempo de consulta: 0.19s Limitar resultados
  1. 1461
    Publicado 2018
    Tabla de Contenidos: “…-- Rooting an Android device -- Root access - adb shell -- Summary -- Chapter 9: Android Data Extraction Techniques -- Data extraction techniques -- Manual data extraction -- Logical data extraction -- ADB pull data extraction -- Using SQLite Browser to view the data -- Extracting device information -- Extracting call logs -- Extracting SMS/MMS -- Extracting browser history -- Analysis of social networking/IM chats -- ADB backup extraction -- ADB dumpsys extraction -- Using content providers -- Physical data extraction -- Imaging an Android phone -- Imaging a memory (SD) card -- Joint Test Action Group -- Chip-off -- Summary -- Chapter 10: Android Data Analysis and Recovery -- Analyzing an Android image -- Autopsy -- Adding an image to Autopsy -- Analyzing an image using Autopsy -- Android data recovery -- Recovering deleted data from an external SD card…”
    Libro electrónico
  2. 1462
    Publicado 2016
    Tabla de Contenidos: “…2.2.2 Public Release of Administrative Data2.2.3 A ""Numerical"" Misunderstanding in Governmental Affairs; 2.3 Internet Data; 2.3.1 Cyberspace: Data of the Sole Existence; 2.3.2 Crawled Fortune; 2.3.3 Forum Opinion Mining; 2.3.4 Chat with Hidden Identities; 2.3.5 Email: The First Type of Electronic Evidence; 2.3.6 Evolution of the Blog; 2.3.7 Six Degrees Social Network; 2.4 Financial Data; 2.4.1 Twins on News and Financial Data; 2.4.2 The Annoyed Data Center; 2.5 Health Data; 2.5.1 Clinical Data: EMRs, EHRs, and PHRs; 2.5.2 Medicare Claims Data Fraud and Abuse Detection…”
    Libro electrónico
  3. 1463
    Publicado 2004
    Tabla de Contenidos: “…Women entrepreneurs : pathways and challenges -- The entrepreneur -- Aspirations and goals -- Capabilities -- Strategic choices -- The venture concept -- Industry -- Resources -- Hurdles to overcome -- Motives, aspirations, and commitment -- Human capital -- Financial knowledge and business savvy -- Growth orientation and strategies -- Social capital and social networks -- Building a management team -- Funding connections -- Higher hurdles for women -- Why are the hurdles higher? …”
    Libro electrónico
  4. 1464
    Publicado 2020
    Tabla de Contenidos: “…Recovering water containers [Generic] -- 9.6. Social network posts -- 9.7. And now for something completely different -- 9.8. …”
    Libro electrónico
  5. 1465
    Publicado 2023
    Tabla de Contenidos: “…Potentially Unwanted Programs (PUPs) -- Phishing -- Hacking, Cybervandalism, and Hacktivism -- Data Breaches -- Credit Card Fraud/Theft -- Identity Fraud -- Spoofing, Pharming, and Spam (Junk) Websites -- Sniffing and Man-in-the-Middle Attacks -- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks -- Insider Attacks -- Poorly Designed Software -- Social Network Security Issues -- Mobile Platform Security Issues -- Insight on Technology: Pegasus Exploits Zero-Day Vulnerabilities to Create Mobile Platform for Cyberespionage -- Cloud Security Issues -- Internet of Things Security Issues -- Metaverse Security Issues -- 5.3 Technology Solutions -- Protecting Internet Communications -- Encryption -- Securing Channels of Communication -- Protecting Networks -- Protecting Servers and Clients -- 5.4 Management Policies, Business Procedures, and Public Laws -- A Security Plan: Management Policies -- Insight on Business: Are Biometrics the Solution for E- commerce Security? …”
    Libro electrónico
  6. 1466
    Publicado 2023
    Tabla de Contenidos: “…Generating Traffic and Capturing an Audience -- Search engine optimization -- Link benefits -- Organic growth -- Establishing Yourself as an Expert -- Gaining Online Exposure -- Networking with Other People in Your Niche -- Branching Out Beyond Your Blog -- Chapter 3 Choosing Your Niche -- Determining Your Niche Blogging Goals -- Building your expertise -- Sharing your passion -- Offering your opinion and sharing your knowledge -- Networking and building relationships -- Making money -- Identifying Niches That Might Work for You -- Determining the Audience Potential for a Niche Blog -- Researching existing niche blogs -- Google Alerts -- Social media searches -- Performing keyword searches -- Google search -- Google Trends -- Chapter 4 Writing for Your Niche -- Creating Content -- Writing different types of posts -- Choosing your voice and style -- Linking -- Finding inspiration for new content -- Branding Your Blog -- Networking and Commenting -- Creating Off-Blog Content for Your Niche Blog -- Email campaigns -- Newsletter subscriptions -- E-books and printables -- Social networking and content sharing -- YouTube videos -- Facebook and LinkedIn groups and pages -- SlideShare presentations -- Flickr -- Self-published books -- Book 3 Corporate and Non-Profit Blogging -- Chapter 1 Starting a Business Blog -- Revealing Why Organizations Blog -- Finding Companies That Do It Right -- Southwest Airlines -- Dell -- John Deere -- Disney Parks -- Compassion International -- Benefiting from a Corporate or Non-Profit Organization Blog -- Building an online presence -- Marketing and publicity -- Brand building -- Customer relations versus customer service -- Employee retention -- Employee referrals and new hiring -- Knowledge, experience, and expertise -- Search engine optimization -- Chapter 2 Developing a Blog Plan -- Researching the Competition…”
    Libro electrónico
  7. 1467
    por Laudon, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…-- 3.3 The Web -- Insight on Society: Government Regulation and Surveillance of the Internet -- Hypertext -- Markup Languages -- HyperText Markup Language (HTML) -- eXtensible Markup Language (XML) -- Web Servers and Clients -- Web Browsers -- 3.4 The Internet and the Web: Features and Services -- Communication Tools -- E-mail -- Messaging Applications -- Online Message Boards -- Internet Telephony -- Videoconferencing, Video Chatting, and Telepresence -- Search Engines -- Insight on Technology: Zoom in the Midst of the Pandemic -- Downloadable and Streaming Media -- Web 2.0 Applications and Services -- Online Social Networks -- Blogs -- Wikis -- Virtual Reality and Augmented Reality -- Intelligent Digital Assistants -- 3.5 Mobile Apps: The Next Big Thing Is Here -- Platforms for Mobile Application Development -- App Marketplaces -- 3.6 Careers in E-commerce -- The Company -- Position: E-commerce Specialist -- Qualifications/Skills -- Preparing for the Interview…”
    Libro electrónico
  8. 1468
    Publicado 2019
    Tabla de Contenidos: “…Consumer Response -- Promotional Tactics -- Advantages and Shortcomings -- Desktop versus Mobile Devices -- The Future -- Advertising's Reach and Efficacy -- Analyzing Website Visits -- Gauging Influence within Social Network -- Google Analytics -- Online Fraud and Unseen Ads -- Pirated Content -- Nielsen -- Time‐Shifted Viewing -- Facebook, Google, and Twitter -- Skipping and Blocking -- Improved Measures of Social Activity -- Traditional Media's Evolution -- Television -- Radio -- Print Media -- Out‐of‐Home Media -- Branded Content -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- 9 Reference Groups and Communities, Opinion Leaders, and Word‐of‐Mouth -- The Credibility and Persuasive Power of Reference Groups -- Consumption‐Related Reference Group -- Friends -- Fellow Shoppers -- Virtual Communities -- Advocacy Groups -- Factors Affecting Reference Group Influence -- Conformity -- Group Power -- Product Expertise -- Product Conspicuousness -- Endorsers and Spokespersons -- Celebrities -- Salesperson Credibility -- Vendor Credibility -- Medium Credibility -- Opinion Leaders and Word‐of‐Mouth -- Characteristics of Opinion Leaders -- Measuring Opinion Leadership -- Questioning -- Social Interactions -- Identifying Experts -- Online Influence -- Word‐of‐Mouth's Strategic Applications -- Online Reference Groups -- Stimulating Word‐of‐Mouth -- Going Viral -- Managing Negative Rumors -- Innovations' Adopters as Reference Groups -- The First Buyers -- The Followers -- The Somewhat Risk‐Averse -- The Highly Risk‐Averse -- The Last to Purchase -- The Nonadopters -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- PART IV Social and Cultural Settings -- 10 The Family and Its Social Standing -- Family and Consumer Socialization -- Parental Styles and Consumer Socialization…”
    Libro electrónico
  9. 1469
    Publicado 2021
    Tabla de Contenidos: “…7 Diagnostics and Visualization of Point Process Models for Event Times on a Social Network -- 7.1. Introduction -- 7.2. Background -- 7.2.1. …”
    Libro electrónico
  10. 1470
    Publicado 2018
    Tabla de Contenidos: “…Suchen und informieren -- Mit und ohne Benutzerkonto -- Videos von YouTube downloaden -- Kanäle, Abos und Playlisten -- Nutzungsmotive: Bildung, Erfahrung, Selbstdarstellung -- YouTube-Star werden -- Geld verdienen mit YouTube -- YouTube als Social Network -- YouTube Kids: Video-App für Kleine -- 360-Grad-Videos und Virtual Reality -- Kapitel 7: Instagram, Snapchat, musical.ly & Co. -- Instagram: von der Foto-App zur Onlinecommunity -- Instagram-Einstellungen und -Eigenschaften -- Snapchat - eine Reaktion auf Bilderflut und Sammelwut -- Nutzungs- und Einstellungsmöglichkeiten von Snapchat -- musical.ly: Video Kills the TV-Stars -- Tipps zu musical.ly -- Facebook - das erwachsene Netzwerk -- Twitter - die Welt in 280 Zeichen -- ask.fm & tellonym: anonyme Kommunikation -- Mediastreaming via Spotify, Netflix, Amazon & Co. -- kinox.to, movie4k, Kinokiste & Co. -- Kapitel 8: Let's Play: Spiele für PCs, Konsolen und Smartphones -- Homo ludens: Spielen ist menschlich -- Von Pong zu Clash Royale: die Evolution digitaler Spiele -- Was wird da gespielt? …”
    Libro electrónico
  11. 1471
    Publicado 2017
    Tabla de Contenidos: “…Looking into the basics of the Apriori algorithm -- Implementing the Apriori algorithm -- Extracting association rules -- Evaluating the association rules -- Summary -- Chapter 5: Features and scikit-learn Transformers -- Feature extraction -- Representing reality in models -- Common feature patterns -- Creating good features -- Feature selection -- Selecting the best individual features -- Feature creation -- Principal Component Analysis -- Creating your own transformer -- The transformer API -- Implementing a Transformer -- Unit testing -- Putting it all together -- Summary -- Chapter 6: Social Media Insight using Naive Bayes -- Disambiguation -- Downloading data from a social network -- Loading and classifying the dataset -- Creating a replicable dataset from Twitter -- Text transformers -- Bag-of-words models -- n-gram features -- Other text features -- Naive Bayes -- Understanding Bayes' theorem -- Naive Bayes algorithm -- How it works -- Applying of Naive Bayes -- Extracting word counts -- Converting dictionaries to a matrix -- Putting it all together -- Evaluation using the F1-score -- Getting useful features from models -- Summary -- Chapter 7: Follow Recommendations Using Graph Mining -- Loading the dataset -- Classifying with an existing model -- Getting follower information from Twitter -- Building the network -- Creating a graph -- Creating a similarity graph -- Finding subgraphs -- Connected components -- Optimizing criteria -- Summary -- Chapter 8: Beating CAPTCHAs with Neural Networks -- Artificial neural networks -- An introduction to neural networks -- Creating the dataset -- Drawing basic CAPTCHAs -- Splitting the image into individual letters -- Creating a training dataset -- Training and classifying -- Back-propagation -- Predicting words -- Improving accuracy using a dictionary -- Ranking mechanisms for word similarity…”
    Libro electrónico
  12. 1472
    Publicado 2022
    Tabla de Contenidos: “…-- The Future of the Industry and Global Business -- About the Contributors -- GOGOX -- About GOGOX -- Backdrop -- First Signs of COVID-19 -- Navigating the Great Lockdown -- The Logistics Flywheel -- People Management in the New Normal -- What We Learned from COVID-19 -- Reverse Engineering -- Future Outlook -- About the Contributors -- Hornet -- About Hornet -- Backdrop: Social Networking for the Gay Community -- First Signs: March 2020 -- During the Great Lockdown of 2020-21 -- Navigating the Great Lockdown -- What the Organization Did for Liquidity -- What the Organization Did with People -- What the Organization Did with Investment Plans -- What Happened Across Regional Markets -- Future Outlook -- Learnings from the Great Lockdown -- About the Contributor -- IndiGrid -- About IndiGrid -- Backdrop -- During the Lockdown -- Future Outlook -- Ready for the Future -- About the Contributor -- Julius Baer -- About Julius Baer -- Backdrop: Wealth Management Industry and Julius Baer Before the Great Lockdown -- First Signs: When COVID-19 Hit the Wealth Management Industry and Julius Baer -- During the Great Lockdown -- Future Outlook -- Learnings from the Great Lockdown -- About the Contributors -- RealWear, Inc -- About RealWear -- The Early Days of the Pandemic -- Navigating the Great Lockdown: The Race to Adapt -- Success Story: How Goodyear Fueled Collaboration with the HMT-1 -- Learnings from the Great Lockdown: Going Forward to Work -- About the Contributors -- SAP -- About SAP -- Introduction -- Backdrop: The Pre-COVID-19 Era -- Growth Strategy -- Goals for Sustained Business Success…”
    Libro electrónico
  13. 1473
    Publicado 2017
    Tabla de Contenidos: “…Performing a normality test with SciPy -- Creating a NumPy masked array -- Disregarding negative and extreme values -- Summary -- Chapter 5: Retrieving, Processing, and Storing Data -- Writing CSV files with NumPy and Pandas -- The binary .npy and pickle formats -- Storing data with PyTables -- Reading and writing Pandas DataFrames to HDF5 stores -- Reading and writing to Excel with Pandas -- Using REST web services and JSON -- Reading and writing JSON with Pandas -- Parsing RSS and Atom feeds -- Parsing HTML with Beautiful Soup -- Summary -- Reference -- Chapter 6: Data Visualization -- The matplotlib subpackages -- Basic matplotlib plots -- Logarithmic plots -- Scatter plots -- Legends and annotations -- Three-dimensional plots -- Plotting in Pandas -- Lag plots -- Autocorrelation plots -- Plot.ly -- Summary -- Chapter 7: Signal Processing and Time Series -- The statsmodels modules -- Moving averages -- Window functions -- Defining cointegration -- Autocorrelation -- Autoregressive models -- ARMA models -- Generating periodic signals -- Fourier analysis -- Spectral analysis -- Filtering -- Summary -- Chapter 8: Working with Databases -- Lightweight access with sqlite3 -- Accessing databases from Pandas -- SQLAlchemy -- Installing and setting up SQLAlchemy -- Populating a database with SQLAlchemy -- Querying the database with SQLAlchemy -- Pony ORM -- Dataset - databases for lazy people -- PyMongo and MongoDB -- Storing data in Redis -- Storing data in memcache -- Apache Cassandra -- Summary -- Chapter 9: Analyzing Textual Data and Social Media -- Installing NLTK -- About NLTK -- Filtering out stopwords, names, and numbers -- The bag-of-words model -- Analyzing word frequencies -- Naive Bayes classification -- Sentiment analysis -- Creating word clouds -- Social network analysis -- Summary -- Chapter 10: Predictive Analytics and Machine Learning…”
    Libro electrónico
  14. 1474
    Publicado 2015
    Tabla de Contenidos: “…The simulation model -- Geometric Brownian simulation -- The diffusion-based simulation -- The threshold model -- Schelling's Segregation Model -- An overview of statistical and machine learning -- K-nearest neighbors -- Generalized linear models -- Bayesian linear regression -- Creating animated and interactive plots -- Summary -- Chapter 6: Statistical and Machine Learning -- Classification methods -- Understanding linear regression -- Linear regression -- Decision tree -- An example -- The Bayes theorem -- The Naïve Bayes classifier -- The Naïve Bayes classifier using TextBlob -- Installing TextBlob -- Downloading corpora -- The Naïve Bayes classifier using TextBlob -- Viewing positive sentiments using word clouds -- k-nearest neighbors -- Logistic regression -- Support vector machines -- Principal component analysis -- Installing scikit-learn -- k-means clustering -- Summary -- Chapter 7: Bioinformatics, Genetics, and Network Models -- Directed graphs and multigraphs -- Storing graph data -- Displaying graphs -- igraph -- NetworkX -- Graph-tool -- The clustering coefficient of graphs -- Analysis of social networks -- The planar graph test -- The directed acyclic graph test -- Maximum flow and minimum cut -- A genetic programming example -- Stochastic block models -- Summary -- Chapter 8: Advanced Visualization -- Computer simulation -- Python's random package -- SciPy's random functions -- Simulation examples -- Signal processing -- Animation -- Visualization methods using HTML5 -- How is Julia different from Python? …”
    Libro electrónico
  15. 1475
    Publicado 2022
    Tabla de Contenidos: “…Introducing example-based machine translation -- Introducing statistical machine translation -- Modeling the translation problem -- Creating the models -- Introducing sequence-to-sequence learning -- Deciphering the encoder/decoder architecture -- Understanding long short-term memory units -- Putting seq2seq in action -- Measuring translation performance -- Summary -- Chapter 7: Summarizing Wikipedia Articles -- Technical requirements -- Understanding text summarization -- Introducing web scraping -- Scraping popular quotes -- Scraping book reviews -- Scraping Wikipedia articles -- Performing extractive summarization -- Performing abstractive summarization -- Introducing the attention mechanism -- Introducing transformers -- Putting the transformer into action -- Measuring summarization performance -- Summary -- Chapter 8: Detecting Hateful and Offensive Language -- Technical requirements -- Introducing social networks -- Understanding BERT -- Pre-training phase -- Fine-tuning phase -- Putting BERT into action -- Introducing boosting algorithms -- Understanding AdaBoost -- Understanding gradient boosting -- Understanding XGBoost -- Creating validation sets -- Learning the myth of Icarus -- Extracting the datasets -- Treating imbalanced datasets -- Classifying with BERT -- Training the classifier -- Applying early stopping -- Understanding CNN -- Adding pooling layers -- Including CNN layers -- Summary -- Chapter 9: Generating Text in Chatbots -- Technical requirements -- Understanding text generation -- Creating a retrieval-based chatbot -- Understanding language modeling -- Understanding perplexity -- Building a language model -- Creating a generative chatbot -- Using a pre-trained model -- Creating the GUI -- Creating the web chatbot -- Fine-tuning a pre-trained model -- Summary -- Chapter 10: Clustering Speech-to-Text Transcriptions…”
    Libro electrónico
  16. 1476
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 Web3 Data Analysis Basics -- Chapter 1: Where Data and Web3 Meet -- Technical requirements -- Exploring the data ingredients -- Understanding the blockchain ingredients -- Three generations of blockchain -- Introducing the blockchain ingredients -- Making the first transaction -- Approaching Web3 industry metrics -- Block height -- Time -- Tokenomics -- Total Value Locked (TVL) -- Total market cap -- Data quality challenges -- Data standards challenges -- Retail -- Confirmations -- NFT Floor Price -- The concept of "lost" -- A brief overview of APIs -- Summary -- Further reading -- Chapter 2: Working with On-Chain Data -- Technical requirements -- Dissecting a transaction -- Nonce -- Gas price -- Gas limit -- Recipient -- Sender -- Value -- Input data -- V,R,S -- Transaction receipt -- Status -- Gas used and Cumulative gas used -- Logs -- Dissecting a block -- Exploring state data -- Reviewing data sources -- Block explorers -- Infura -- Moralis -- GetBlock -- Dune -- Covalent -- Flipside -- The Graph -- Google BigQuery -- Summary -- Further reading -- Chapter 3: Working with Off-Chain Data -- Technical requirements -- Introductory example - listing data sources -- Adding prices to our dataset -- CoinGecko -- CoinMarketCap -- Binance -- Oracles - Chainlink -- OHLC - Kraken -- Final thoughts on prices -- Adding news to our dataset -- Adding social networks to our dataset -- X (formerly Twitter) -- Summary -- Further reading -- Chapter 4: Exploring the Digital Uniqueness of NFTs - Games, Art, and Identity -- Technical requirements -- Enabling unique asset tracking on the blockchain using NFT -- The business requests -- The technical solution -- Blockchain gaming - the GameFi proposal -- Introduction to the business landscape…”
    Libro electrónico
  17. 1477
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
    Libro electrónico
  18. 1478
    Publicado 2013
    Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
    Libro electrónico
  19. 1479
    Publicado 1997
    Tabla de Contenidos: “…Measurement of Household Resources -- Changes in Health Outcomes -- Long-Run Measures of Economic Resources -- CONCLUSIONS -- ACKNOWLEDGMENT -- REFERENCES -- 5 How Health Behaviors and the Social Environment Contribute to Health Differences Between Black and White Older Americans -- INTRODUCTION -- THE ROLE OF ATTITUDES AND SOCIAL CONTEXT IN BEHAVIORS THAT DAMAGE OR PROMOTE HEALTH AMONG BLACKS AND WHITES -- Self-Appraisal of Health and Health Behavior -- Health Behaviors -- Diet and Exercise -- Cigarette Smoking -- Alcohol Use -- Health Practices of Elderly Diabetics and Hypertensives -- Social Networks and Social Support -- RACIAL AND SOCIOECONOMIC DIFFERENCES IN HEALTH AND SOCIAL BEHAVIORS: FINDINGS FROM THE NEW HAVEN EPESE -- CONCLUSIONS -- REFERENCES -- 6 Black-White Differences in the Use of Medical Care by the Elderly: A Contemporary Analysis -- INTRODUCTION -- DATA AND METHODS -- Data and Study Sample -- Variables -- Utilization of Medical Care -- Demographic and Socioeconomic Characteristics -- Health Status -- Attitudes and Beliefs -- Statistical Analysis -- RESULTS -- Bivariate Analyses -- Multivariate Analyses -- DISCUSSION -- REFERENCES -- 7 Are Genetic Factors Involved in Racial and Ethnic Differences in Late-Life Health? …”
    Libro electrónico
  20. 1480
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 Web3 Data Analysis Basics -- Chapter 1: Where Data and Web3 Meet -- Technical requirements -- Exploring the data ingredients -- Understanding the blockchain ingredients -- Three generations of blockchain -- Introducing the blockchain ingredients -- Making the first transaction -- Approaching Web3 industry metrics -- Block height -- Time -- Tokenomics -- Total Value Locked (TVL) -- Total market cap -- Data quality challenges -- Data standards challenges -- Retail -- Confirmations -- NFT Floor Price -- The concept of "lost" -- A brief overview of APIs -- Summary -- Further reading -- Chapter 2: Working with On-Chain Data -- Technical requirements -- Dissecting a transaction -- Nonce -- Gas price -- Gas limit -- Recipient -- Sender -- Value -- Input data -- V,R,S -- Transaction receipt -- Status -- Gas used and Cumulative gas used -- Logs -- Dissecting a block -- Exploring state data -- Reviewing data sources -- Block explorers -- Infura -- Moralis -- GetBlock -- Dune -- Covalent -- Flipside -- The Graph -- Google BigQuery -- Summary -- Further reading -- Chapter 3: Working with Off-Chain Data -- Technical requirements -- Introductory example - listing data sources -- Adding prices to our dataset -- CoinGecko -- CoinMarketCap -- Binance -- Oracles - Chainlink -- OHLC - Kraken -- Final thoughts on prices -- Adding news to our dataset -- Adding social networks to our dataset -- X (formerly Twitter) -- Summary -- Further reading -- Chapter 4: Exploring the Digital Uniqueness of NFTs - Games, Art, and Identity -- Technical requirements -- Enabling unique asset tracking on the blockchain using NFT -- The business requests -- The technical solution -- Blockchain gaming - the GameFi proposal -- Introduction to the business landscape…”
    Libro electrónico