Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Perry Oliver

Designing Embedded Systems and the Internet of Things (IoT) with the ARM mbed
A comprehensive and accessible introduction to the development of embedded systems and Internet of Things devices using ARM mbed Designing Embedded Systems and the Internet of Things (IoT) with the ARM mbed offers an accessible guide to the development of ARM mbed and includes a range of topics on the subject from the basic to the advanced. ARM mbed is a platform and operating system based on 32-bit ARM Cortex-M microcontrollers. This important resource puts the focus on ARM mbed NXP LPC1768 and FRDM-K64F evaluation boards. NXP LPC1768 has powerful features such as a fast microcontroller, various digital and analog I/Os, various serial communication interfaces and a very easy to use Web based compiler. It is one of the most popular kits that are used to study and create projects. FRDM-K64F is relatively new and largely compatible with NXP LPC1768 but with even more powerful features. This approachable text is an ideal guide that is divided into four sections; Getting Started with the ARM mbed, Covering the Basics, Advanced Topics and Case Studies. This getting started guide: Offers a clear introduction to the topicContains a wealth of original and illustrative case studiesIncludes a practical guide to the development of projects with the ARM mbed platformPresents timely coverage of how to develop IoT applications Designing Embedded Systems and the Internet of Things (IoT) with the ARM mbed offers students and R&D engineers a resource for understanding the ARM mbed NXP LPC1768 evaluation board.
LinkedIn Sales Navigator For Dummies

LinkedIn Sales Navigator For Dummies

Perry van Beek

John Wiley Sons Inc
2018
nidottu
Make selling a social affair! The ABCs of sales have changed. It's no longer: A-Always, B-Be, C-Closing. The new way of selling is: A-Always, B-Be, C-Contributing to your buyer's journey. Social selling is an effective way to engage with your customer, and the world's most powerful social selling tool for any B2B sales professional is LinkedIn Sales Navigator. It allows you to gain access to more leads, more InMail, and data to track your efforts. With the help of LinkedIn Sales Navigator For Dummies, you'll learn how to write effective InMail messages and engage with prospects on the world's most successful professional networking site. Along with utilizing those features, you'll also benefit from access to full profiles outside of your network, guidance on how to best optimize your own profile for sales opportunities, and much more. Use lead recommendations to get in front of the right buyerAnalyze your social selling efforts with real-time dataReach more leads with customized InMail messagesSave 30 - 60 minutes a day previously spent on acquisitions If you're a B2B sales professional who is new to LinkedIn Sales Navigator, this is the one-stop resource you can't be without.
Practical Java Programming for IoT, AI, and Blockchain
Learn practical uses for some of the hottest tech applications trending among technology professionals We are living in an era of digital revolution. On the horizon, many emerging digital technologies are being developed at a breathtaking speed. Whether we like it or not, whether we are ready or not, digital technologies are going to penetrate more and more, deeper and deeper, into every aspect of our lives. This is going to fundamentally change how we live, how we work, and how we socialize. Java, as a modern high-level programming language, is an excellent tool for helping us to learn these digital technologies, as well as to develop digital applications, such as IoT, AI, Cybersecurity, Blockchain and more. Practical Java Programming uses Java as a tool to help you learn these new digital technologies and to be better prepared for the future changes. Gives you a brief overview for getting started with Java ProgrammingDives into how you can apply your new knowledge to some of the biggest trending applications todayHelps you understand how to program Java to interact with operating systems, networking, and mobile applicationsShows you how Java can be used in trending tech applications such as IoT (Internet of Things), AI (Artificial Intelligence), Cybersecurity, and Blockchain Get ready to find out firsthand how Java can be used for connected home devices, healthcare, the cloud, and all the hottest tech applications.
Transformational Security Awareness

Transformational Security Awareness

Perry Carpenter

John Wiley Sons Inc
2019
nidottu
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture managementOvercome the knowledge-intention-behavior gapOptimize your program to work with the realities of human natureUse simulations, games, surveys, and leverage new trends like escape rooms to teach security awarenessPut effective training together into a well-crafted campaign with ambassadorsUnderstand the keys to sustained success and ongoing culture changeMeasure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.
Trading Systems and Methods

Trading Systems and Methods

Perry J. Kaufman

John Wiley Sons Inc
2019
sidottu
The new edition of the definitive reference to trading systems—expanded and thoroughly updated. Professional and individual traders haverelied on Trading Systems and Methods for over three decades. Acclaimed trading systems expert Perry Kaufman provides complete, authoritative information on proven indicators, programs, systems, and algorithms. Now in its sixth edition, this respected book continues to provide readers with the knowledge required to develop or select the trading programs best suited for their needs. In-depth discussions of basic mathematical and statistical concepts instruct readers on how much data to use, how to create an index, how to determine probabilities, and how best to test your ideas. These technical tools and indicators help readers identify trends, momentum, and patterns, while an analytical framework enables comparisons of systematic methods and techniques. This updated, fully-revised edition offers new examples using stocks, ETFs and futures, and provides expanded coverage of arbitrage, high frequency trading, and sophisticated risk management models. More programs and strategies have been added, such as Artificial Intelligence techniques and Game Theory approaches to trading. Offering a complete array of practical, user-ready tools, this invaluable resource: Offers comprehensive revisions and additional mathematical and statistical tools, trading systems, and examples of current market situationsExplains basic mathematical and statistical concepts with accompanying codeIncludes new Excel spreadsheets with genetic algorithms, TradeStation code, MetaStock code, and moreProvides access to a companion website packed with supplemental materials Trading Systems and Methods is an indispensable reference on trading systems, as well as system design and methods for professional and individual active traders, money managers, trading systems developers.
Artificial Intelligence Programming with Python
A hands-on roadmap to using Python for artificial intelligence programming In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples. Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learningExpansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learningPractical AI and Python “cheat sheet” quick referencesThis hands-on AI programming guide is perfect for anyone with a basic knowledge of programming—including familiarity with variables, arrays, loops, if-else statements, and file input and output—who seeks to understand foundational concepts in AI and AI development.
The Security Culture Playbook

The Security Culture Playbook

Perry Carpenter; Kai Roer

JOHN WILEY SONS INC
2022
sidottu
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measuredA careful exploration of the 7 dimensions that comprise security culturePractical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity ModelInsights into building support within the executive team and Board of Directors for your culture management programAlso including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.
Real Sound Synthesis for Interactive Applications
Virtual environments such as games and animated and "real" movies require realistic sound effects that can be integrated by computer synthesis. The book emphasizes physical modeling of sound and focuses on real-world interactive sound effects. It is intended for game developers, graphics programmers, developers of virtual reality systems and training simulators, and others who want to learn about computational sound. It is written at an introductory level with mathematical foundations provided in appendices. Links to code examples and sound files can be found on the Downloads/Updates tab.
Stereotypes and the Construction of the Social World
Stereotypes and the Construction of the Social World explores the complexity of stereotypes, guiding the reader through issues of definition and theoretical explanations from psychology and other disciplines. The book examines why people use stereotypes, which have often been represented as inaccurate, rigid and discriminatory. If that is what they are, then why would people employ such ‘faulty’ or ‘biased’ views of others?While this book presents a detailed and comprehensive analysis of the psychological research into the individual use of stereotypes, it also presents this research within its ideological and historical context, revealing the important sociocultural factors in what we mean by ‘stereotypes’. From the politics of representation and intergroup power relations, alongside individual social cognitive issues, the book provides a comprehensive and cross-disciplinary account of stereotypes and stereotyping. Featuring a wealth of real-world examples, it will be essential reading for all students and researchers of stereotypes.
Stereotypes and the Construction of the Social World
Stereotypes and the Construction of the Social World explores the complexity of stereotypes, guiding the reader through issues of definition and theoretical explanations from psychology and other disciplines. The book examines why people use stereotypes, which have often been represented as inaccurate, rigid and discriminatory. If that is what they are, then why would people employ such ‘faulty’ or ‘biased’ views of others?While this book presents a detailed and comprehensive analysis of the psychological research into the individual use of stereotypes, it also presents this research within its ideological and historical context, revealing the important sociocultural factors in what we mean by ‘stereotypes’. From the politics of representation and intergroup power relations, alongside individual social cognitive issues, the book provides a comprehensive and cross-disciplinary account of stereotypes and stereotyping. Featuring a wealth of real-world examples, it will be essential reading for all students and researchers of stereotypes.
Presenting Your Data with SPSS Explained

Presenting Your Data with SPSS Explained

Perry R. Hinton; Isabella McMurray

Routledge
2017
sidottu
Data Presentation with SPSS Explained provides students with all the information they need to conduct small scale analysis of research projects using SPSS and present their results appropriately in their reports. Quantitative data can be collected in the form of a questionnaire, survey or experimental study. This book focuses on presenting this data clearly, in the form of tables and graphs, along with creating basic summary statistics. Data Presentation with SPSS Explained uses an example survey that is clearly explained step-by-step throughout the book. This allows readers to follow the procedures, and easily apply each step in the process to their own research and findings.No prior knowledge of statistics or SPSS is assumed, and everything in the book is carefully explained in a helpful and user-friendly way using worked examples. This book is the perfect companion for students from a range of disciplines including psychology, business, communication, education, health, humanities, marketing and nursing – many of whom are unaware that this extremely helpful program is available at their institution for their use.
Presenting Your Data with SPSS Explained

Presenting Your Data with SPSS Explained

Perry R. Hinton; Isabella McMurray

Routledge
2017
nidottu
Data Presentation with SPSS Explained provides students with all the information they need to conduct small scale analysis of research projects using SPSS and present their results appropriately in their reports. Quantitative data can be collected in the form of a questionnaire, survey or experimental study. This book focuses on presenting this data clearly, in the form of tables and graphs, along with creating basic summary statistics. Data Presentation with SPSS Explained uses an example survey that is clearly explained step-by-step throughout the book. This allows readers to follow the procedures, and easily apply each step in the process to their own research and findings.No prior knowledge of statistics or SPSS is assumed, and everything in the book is carefully explained in a helpful and user-friendly way using worked examples. This book is the perfect companion for students from a range of disciplines including psychology, business, communication, education, health, humanities, marketing and nursing – many of whom are unaware that this extremely helpful program is available at their institution for their use.
Overland Explorations in Siberia, Northern Asia, and the Great Amoor River Country ... with Map and Plan of an Overland Telegraph Around the World, Etc.
Title: Overland Explorations in Siberia, Northern Asia, and the Great Amoor River Country ... With map and plan of an overland telegraph around the world, etc.Publisher: British Library, Historical Print EditionsThe British Library is the national library of the United Kingdom. It is one of the world's largest research libraries holding over 150 million items in all known languages and formats: books, journals, newspapers, sound recordings, patents, maps, stamps, prints and much more. Its collections include around 14 million books, along with substantial additional collections of manuscripts and historical items dating back as far as 300 BC.The HISTORY OF TRAVEL collection includes books from the British Library digitised by Microsoft. This collection contains personal narratives, travel guides and documentary accounts by Victorian travelers, male and female. Also included are pamphlets, travel guides, and personal narratives of trips to and around the Americas, the Indies, Europe, Africa and the Middle East. ++++The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to insure edition identification: ++++ British Library Collins, Perry MacDonough; 1864. 467 p.; 12 . 10056.bb.22.