Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
"The Living Books About Life series is written and produced by humanities scholars from universities across the world. Funded by JISC and published by the Open Humanities Press, the books present recent research on these subjects using interactive maps, podcasts and audio-visual materials. The result, which can be shared freely amongst both academic and non-academic individuals alike, is an engaging and diverse resource for researching and teaching relevant science issues across the humanities."
Choose an application
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key assumptions, which are used by the model to differentiate between normal and anomalous behavior. When applying a given model to a particular application, the assumptions can be used as guidelines to assess the effectiveness of the model in that domain. Each chapter provides an advanced deep content understanding and anomaly detection algorithm, and then shows how the proposed approach is deviating of the basic techniques. Further, for each chapter, it describes the advantages and disadvantages of the algorithm. The final chapters provide a discussion on the computational complexity of the models and graph computational frameworks such as Google Tensorflow and H2O because it is an important issue in real application domains. This book provides a better understanding of the different directions in which research has been done on deep semantic analysis and situational assessment using deep learning for anomalous detection, and how methods developed in one area can be applied in applications in other domains. This book seeks to provide both cyber analytics practitioners and researchers an up-to-date and advanced knowledge in cloud based frameworks for deep semantic analysis and advanced anomaly detection using cognitive and artificial intelligence (AI) models.
Semantic computing. --- Anomaly detection (Computer security) --- Invisible Web.
Choose an application
Invisible Web. --- Invisible Web --- Internet searching. --- Database searching. --- Web invisible --- Recherche sur Internet --- Bases de données --- Study and teaching. --- Etude et enseignement --- Interrogation --- 528.51 --- Google --- informatica --- internet - adresboeken, browsers, chatten, e-mail, tagging, sociale netwerken --- Bases de données
Choose an application
The hidden rise of personalization on the Internet is controlling--and limiting--the information we consume. In 2009, Google began customizing its search results. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, this change is symptomatic of the most significant shift to take place on the Web in recent years--the rise of personalization. Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Data companies track your personal information to sell to advertisers, from your political leanings to the hiking boots you just browsed on Zappos. In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs--and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.--
Invisible Web. --- Internet --- Web search engines. --- Target marketing. --- Selective dissemination of information. --- Web invisible --- Moteurs de recherche sur Internet --- Cibles (Marketing) --- Diffusion sélective de l'information --- Censorship. --- Censure --- Invisible Web --- Information organization --- Semantic Web --- World Wide Web --- Social aspects --- Subject access --- Censorship --- Diffusion sélective de l'information --- Semantic Web - Social aspects --- World Wide Web - Subject access --- Internet - Censorship
Choose an application
"This book explores the Dark Web--sites that must be accessed through special routers designed to protect the anonymity of visitors and publishers. Avoiding sensationalist definitions that conflate the Dark Web with illicit activity or "deep layers" that search engines cannot crawl, Gehl focuses on anonymity and encryption as the key differences between the Dark Web and the everyday "Clear Web" on which both users and publishers are tracked and identified. Gehl focuses here on Dark Web systems -- Freenet, I2P, and Tor -- to reveal the wide range of activities, many of them perfectly legal and socially enlightened, that the Dark Web supports. Despite its various uses, the question of legitimacy is an essential one: who needs the Dark Web and why? To answer these questions, this book shares the perspectives of the Dark Web's creators, users, and publishers, and proposes an original theory of media legitimacy as it relates to state power, organizational propriety, and authenticity"--
Invisible Web --- BE-BxUSL --- Massacommunicatie --- Computerarchitectuur. Operating systems --- Invisible Web. --- Dark Web. --- Mass communications --- Computer architecture. Operating systems --- Computer networks --- Internet --- Social aspects. --- INFORMATION SCIENCE/Internet Studies --- INFORMATION SCIENCE/Technology & Policy --- INFORMATION SCIENCE/Communications & Telecommunications --- Deep Web --- Deepnet --- Hidden Web --- World Wide Web
Choose an application
Demonstrating why teaching the Invisible Web should be a requirement for information literacy education in the 21st century, here the authors expand on the teaching foundation provided in the first book and persuasively argue that the Invisible Web is still relevant not only to student research but also to everyday life.
Invisible Web. --- Invisible Web --- Internet searching. --- Database searching. --- Data base searching --- Database search strategies --- Search strategies in databases --- Searching databases --- Electronic information resource searching --- Searching the Internet --- Web searching --- World Wide Web searching --- Deep Web --- Deepnet --- Hidden Web --- World Wide Web --- Study and teaching. --- usynlig internett --- world wide web --- informasjonsgjenfinning --- læring --- undervisning --- søketeknikk --- verdensveven --- databaser --- informasjonssøking --- søking --- online --- skjult
Choose an application
This edited volume explores the fundamental aspects of the dark web, ranging from the technologies that power it, the cryptocurrencies that drive its markets, the criminalities it facilitates to the methods that investigators can employ to master it as a strand of open source intelligence. The book provides readers with detailed theoretical, technical and practical knowledge including the application of legal frameworks. With this it offers crucial insights for practitioners as well as academics into the multidisciplinary nature of dark web investigations for the identification and interception of illegal content and activities addressing both theoretical and practical issues. Offers a practical and applied dive into the dark web and its technologies, currencies, and criminalities; Provides contributions from academia and practitioners on identifying and monitoring illegal activities conducted on the dark web; Explores state of art in cyber security and cybercrime investigation on a global scale.
Social problems --- International law --- Criminology. Victimology --- Criminal law. Criminal procedure --- Telecommunication technology --- Production management --- Mass communications --- Computer architecture. Operating systems --- veiligheid (mensen) --- criminologie --- criminaliteit --- internationaal recht --- tekstverwerking --- computernetwerken --- communicatietechnologie --- Dark Web. --- Dark Internet --- Darknet --- Invisible Web --- Information systems
Choose an application
The hidden rise of personalization on the Internet is controlling--and limiting--the information we consume. In 2009, Google began customizing its search results. Instead of giving you the most broadly popular result, Google now tries to predict what you are most likely to click on. According to MoveOn.org board president Eli Pariser, this change is symptomatic of the most significant shift to take place on the Web in recent years--the rise of personalization. Though the phenomenon has gone largely undetected until now, personalized filters are sweeping the Web, creating individual universes of information for each of us. Data companies track your personal information to sell to advertisers, from your political leanings to the hiking boots you just browsed on Zappos. In a personalized world, we will increasingly be typed and fed only news that is pleasant, familiar, and confirms our beliefs--and because these filters are invisible, we won't know what is being hidden from us. Our past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas.--From publisher description
Computer architecture. Operating systems --- Invisible Web --- Information organization --- Semantic Web --- World Wide Web --- Internet --- Social aspects --- Subject access --- Censorship --- Invisible Web. --- Information organization. --- Subject access to the World Wide Web --- Subject retrieval on the World Wide Web --- Subject cataloging --- Web search engines --- Semantic integration (Computer systems) --- Semantic networks (Information theory) --- Microformats --- Information storage and retrieval --- Organization of information --- Information science --- Information storage and retrieval systems --- Deep Web --- Deepnet --- Hidden Web --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- Social aspects. --- Subject access. --- Censorship. --- Semantic Web - Social aspects --- World Wide Web - Subject access --- Internet - Censorship
Choose an application
This book builds upon the authors' previous well-respected book, Going Beyond Google, which placed teaching the Invisible Web into information literacy programmes. Going Beyond Google Again expands on the teaching foundation laid in the first book and continues to document the Invisible Web's existence and evolution, and suggests ways of teaching students to use it. The new book focuses on events and materials from the 4 years.
Internet searching --- Internet research --- Invisible Web --- Computer network resources --- Study and teaching (Higher). --- Use studies. --- Internet dans la recherche --- Web invisible --- Information électronique --- Étude et enseignement (Supérieur) --- Etude et enseignement (Supérieur) --- Information électronique --- Étude et enseignement (Supérieur) --- Information retrieval --- Computer architecture. Operating systems --- Recherche sur Internet --- Study and teaching (Higher) --- Use studies --- Etude et enseignement (Supérieur) --- Cas, Etudes de
Choose an application
Le Darknet suscite depuis plusieurs années fascination et inquiétude. Internet caché, web profond, darknet, deep web, ces termes souvent confondus désignent des réalités pourtant bien différentes. Depuis l'apparition du hacking et le développement du téléchargement illégal jusqu’à la création des véritables réseaux parallèles que constituent Tor, I2P ou Freenet, les darknets sont un phénomène informatique en passe de devenir un phénomène de société. Alors que Facebook ou Twitter ont déjà fait leur entrée sur Tor, cryptoanarchistes, activistes et lanceurs d'alerte côtoient encore pirates informatiques et vendeurs de stupéfiants sur des réseaux cachés qui s'ouvrent lentement au grand public. Géopolitique du Darknet retrace l'historique de la création et du développement de ces réseaux parallèles et analyse les implications géopolitiques, économiques et socioculturelles du phénomène en termes de cybersécurité, de préservation des libertés individuelles et de gouvernance globale d'Internet.
Réseaux anonymes (informatique) --- Médias numériques. --- Réseaux d'ordinateurs. --- Technologies de l'information et de la communication. --- Invisible Web --- Cyberspace --- Internet --- Computer security --- Social aspects --- Political aspects --- Security measures --- Technologies de l'information et de la communication --- Cyberspace - Social aspects --- Cyberspace - Political aspects --- Internet - Security measures
Listing 1 - 10 of 11 | << page >> |
Sort by
|