Founder and bestselling author Alan Cooper contributes the Foreword to this much-anticipated hands-on guide, and the masters of design at Cooper offer unparalleled insight on designing web sites, software, handhelds, and all other interactive products from start to finish. You'll discover proven methods developed by leading interaction design consultancy Cooper, while the book focuses on process and work practices, rather than on the principles. Topics covered include creating personas, evolving the visual design, collaborating within and outside of the design team, understanding potential users and customers, and more. Whether you´re designing consumer electronics, medical devices, enterprise Web apps, or new ways to check out at the supermarket, today´s digitally-enabled products and services provide both great opportunities to deliver compelling user experiences and great risks of driving your customers crazy with complicated, confusing technology. Designing successful products and services in the digital age requires a multi-disciplinary team with expertise in interaction design, visual design, industrial design, and other disciplines. It also takes the ability to come up with the big ideas that make a desirable product or service, as well as the skill and perseverance to execute on the thousand small ideas that get your design into the hands of users. It requires expertise in project management, user research, and consensus-building. This comprehensive, full-color volume addresses all of these and more with detailed how-to information, real-life examples, and exercises. Topics include assembling a design team, planning and conducting user research, analyzing your data and turning it into personas, using scenarios to drive requirements definition and design, collaborating in design meetings, evaluating and iterating your design, and documenting finished design in a way that works for engineers and stakeholders alike.
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder´s footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You´ll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals
Das Buch behandelt die Entwicklung von modernen zu digitalen Städten. Es skizziert neue Geschäftsmodelle durch Cloud Computing und Apps-Öko-Systeme im Umfeld von Smart-City-Projekten. Es geht auf die tiefgreifenden Veränderungen für Smart-City-Infrastruktur-Anbieter durch neuartige Daten-Management-basierte Geschäftsmodelle ein. Die Rolle der Bürger und das veränderte Selbstverständnis der Stadtverwaltungen ist ein weiterer Schwerpunkt. Die Autoren geben Handlungsempfehlungen für alle Akteure einer Smart City, um komplexe Lösungen im engen Verbund mit den Bürgern und Verwaltungen zu realisieren. Die erforderlichen Geschäftsmodelle werden praxistauglich in Anwendungsbeispielen dargestellt.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018. The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.
This book constitutes the thoroughly refereed proceedings of the 15th Italian Research Conference on Digital Libraries, IRCDL 2019, held in Pisa, Italy, in January/February 2019. The 22 full papers and 5 short papers presented were carefully selected from 42 submissions. The papers are organized in topical sections on information retrieval, digital libraries and archives, information integration, open science, and data mining.
For courses in Image Processing and Computer Vision. Introduce your students to image processing with the industry´s most prized text For 40 years, Image Processing has been the foundational text for the study of digital image processing. The book is suited for students at the college senior and first-year graduate level with prior background in mathematical analysis, vectors, matrices, probability, statistics, linear systems, and computer programming. As in all earlier editions, the focus of this edition of the book is on fundamentals. The 4th Edition, which celebrates the book´s 40th anniversary, is based on an extensive survey of faculty, students, and independent readers in 150 institutions from 30 countries. Their feedback led to expanded or new coverage of topics such as deep learning and deep neural networks, including convolutional neural nets, the scale-invariant feature transform (SIFT), maximally-stable extremal regions (MSERs), graph cuts, k-means clustering and superpixels, active contours (snakes and level sets), and exact histogram matching. Major improvements were made in reorganizing the material on image transforms into a more cohesive presentation, and in the discussion of spatial kernels and spatial filtering. Major revisions and additions were made to examples and homework exercises throughout the book.
Computer systems are simply one type of electrical systems. Using the concept of ´´abstraction´´, this book attempts to unify electrical engineering and computer science as the art of creating and exploiting successive abstractions to manage the complexity of building useful electrical systems.
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they´ve adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as ´´identity management architecture´´ (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today´s service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley´s experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt´s administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley´s favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Unter dem Begriff ´´forensische Informatik´´ versteht man die Anwendung wissenschaftlicher Methoden der Informatik auf Fragen des Rechtssystems. Insbesondere stellt die forensische Informatik Methoden zur gerichtsfesten Sicherung und Verwertung digitaler Spuren bereit, etwa zur Untersuchung und Verfolgung von Straftaten. Viele Methoden der Informatik können auf Fragen des Rechtssystems angewendet werden. Die vorliegenden Ausführungen geben eine Einführung in die forensische Informatik und einen breiten Überblick über das Gebiet. Das Buch richtet sich an interessierte Personen, die sich in diesem Bereich mit fundiertem Hintergrundwissen ausstatten möchten.