Listing 1 - 10 of 84 << page
of 9
>>
Sort by

Book
OECD Environmental Performance Reviews : Germany 2023
Author:
ISBN: 9264665897 Year: 2023 Publisher: Paris : OECD Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Germany has continued to improve its environmental performance over the past decade. It has ambitious climate targets with the aim to reach climate neutrality by 2045 and achieve negative emissions after 2050. Nevertheless, Germany will need to further accelerate climate action, particularly in the buildings and transport sectors, and address the triple crisis of energy, climate and biodiversity in an integrated and holistic manner. As part of its energy crisis response, Germany has taken a series of measures, which are historic in size and scope. They are set to massively accelerate its green energy transition in the coming years. It is also scaling up its engagement on climate change adaptation across all government levels and has initiated an ambitious programme to foster investments in nature-based solutions. This is the fourth OECD Environmental Performance Review of Germany. It provides 28 recommendations to help Germany further improve its environmental performance.


Book
Resilience in complex socio-ecological systems
Authors: ---
ISBN: 0081028555 0081028547 Year: 2019 Publisher: London, United Kingdom : Academic Press, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Anomaly detection : techniques and applications
Author:
ISBN: 1536193550 Year: 2021 Publisher: New York : Nova Science Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern from the usual behavior is called an anomaly. The anomaly in the data is also referred to as noise, outlier, spammer, deviations, novelties and exceptions. Identification of the rare items, events, observations, patterns which raise suspicion by differing significantly from the majority of data is called anomaly detection. With progress in technology and the widespread use of data for the purpose of business, spam faced by individuals and companies is increasing day by day. This noisy data has boomed as a major problem in various areas such as Internet of Things, web service, machine learning, artificial intelligence, deep learning, image processing, cloud computing, audio processing, video processing, VoIP, data science, wireless sensor, etc. Identifying the anomaly data and filtering them before processing is a major challenge for the data analyst. This anomaly is unavoidable in all areas of research. This book covers the techniques and algorithms for detecting the deviated data. This book will mainly target researchers and higher graduate learners in computer science and data science"--


Book
The science policy gap regarding informed decisions in forest policy and management : What scientific information are policy makers really interested in? : Proceedings of the 6 th International Workshop on Santiago de Chile, Chile 13.11. - 19.11.2016
Authors: --- ---
ISBN: 3736984979 Year: 2017 Publisher: Gottingen, [Germany] : Cuvillier Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Analysiere das Web! : wie Sie Marketing und Kommunikation mit Social Media Monitoring verbessern
Author:
ISBN: 3648104071 364810408X Year: 2018 Publisher: Freiburg, [Germany] ; Munchen, [Germany] ; Stuttgart, [Germany] : Haufe Gruppe,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Long description: Werden Sie Profi beim Thema Social Media Monitoring: Mit diesem Buch verschaffen Sie sich einen Überblick über die Grundlagen der Web-Analyse und optimieren Ihre digitale Kommunikation mit Hilfe von nützlichen Tools sowie praxiserprobten Methoden. Schritt für Schritt setzen Sie die für Sie relevanten Zielwerte, nutzen die technischen Möglichkeiten zur Zielerreichung, Erfolgsmessung sowie Trenderkennung und visualisieren die gewonnenen Daten ansprechend in Ihren Reportings. Experteninterviews geben Ihnen zusätzlich neue Impulse für maximalen Social-Media-Erfolg.Inhalte:Fünf Arbeitsfelder der Web-Analyse für besseres Marketing und KommunikationMarktüberblick über Tools und TechnologienZahlreiche Szenarien sowie Methoden und MetrikenZielorientierte ToolauswahlKostenlose Tools für Analyse und VisualisierungEigene Website zum Buch  Biographical note: Stefan Evertz Stefan Evertz beschäftigt sich als unabhängiger Berater und Speaker seit 2010 mit dem Thema Social Media Monitoring. Dabei unterstützt er Firmen und Organisationen bei der Toolauswahl und auch bei Integration und Nutzung, z.B. durch Analysen und Reports. Weiterhin organisiert er seit 2012 das MonitoringCamp und betreibt das Online-Magazin MonitoringMatcher.


Book
Network tomography : identifiability, measurement design, and network state inference
Authors: --- --- ---
ISBN: 1108383785 1108381863 1108377114 Year: 2021 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Providing the first truly comprehensive overview of Network Tomography - a novel network monitoring approach that makes use of inference techniques to reconstruct the internal network state from external vantage points - this rigorous yet accessible treatment of the fundamental theory and algorithms of network tomography covers the most prominent results demonstrated on real-world data, including identifiability conditions, measurement design algorithms, and network state inference algorithms, alongside practical tools for applying these techniques to real-world network management. It describes the main types of mathematical problems, along with their solutions and properties, and emphasizes the actions that can be taken to improve the accuracy of network tomography. With proofs and derivations introduced in an accessible language for easy understanding, this is an essential resource for professional engineers, academic researchers, and graduate students in network management and network science.


Book
The Gulf Research Program annual report 2018
Author:
ISBN: 0309493196 Year: 2019 Publisher: Washington, District of Columbia : National Academies Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Wireless sensor networks : deployment strategies for outdoor monitoring
Author:
ISBN: 1351207024 1351207016 Year: 2018 Publisher: Boca Raton, Florida ; London, [England] ; New York : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Nmap network exploration and security auditing cookbook : network discovery and security scanning at your fingertips
Author:
ISBN: 1838640789 Year: 2021 Publisher: Birmingham, England ; Mumbai : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiastsKey FeaturesBook DescriptionNmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today’s technology ecosystems. The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more. By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.What you will learnScan systems and check for the most common vulnerabilitiesExplore the most popular network protocolsExtend existing scripts and write your own scripts and librariesIdentify and scan critical ICS/SCADA systemsDetect misconfigurations in web servers, databases, and mail serversUnderstand how to identify common weaknesses in Windows environmentsOptimize the performance and improve results of scansWho this book is forThis Nmap cookbook is for IT personnel, security engineers, system administrators, application security enthusiasts, or anyone who wants to master Nmap and its scripting engine. This book is also recommended for anyone looking to learn about network security auditing, especially if they’re interested in understanding common protocols and applications in modern systems. Advanced and seasoned Nmap users will also benefit by learning about new features, workflows, and tools. Basic knowledge of networking, Linux, and security concepts is required before taking up this book.


Book
Workplace monitoring and technology
Author:
ISBN: 100319950X 100319950X 1000645096 Year: 2023 Publisher: New York, New York : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools. Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task. Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions. The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions. The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring. However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage. Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology"--

Listing 1 - 10 of 84 << page
of 9
>>
Sort by