Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
133,466 result(s) for "Computer users"
Sort by:
The zero trust framework : threat hunting & quantum mechanics
\"The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Even despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not to participate in. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography\"-- Provided by publisher.
Designing with the mind in mind : simple guide to understanding user interface design guidelines
In this completely updated and revised edition of Designing with the Mind in Mind, Jeff Johnson provides you with just enough background in perceptual and cognitive psychology that user interface (UI) design guidelines make intuitive sense rather than being just a list or rules to follow.Early UI practitioners were trained in cognitive psychology.
Brave NUI world : designing natural user interfaces for touch and gesture
Brave NUI World is the first practical guide for designing touch- and gesture-based user interfaces.Written by the team from Microsoft that developed the multi-touch, multi-user Surface® tabletop product, it introduces the reader to natural user interfaces (NUI).
Cyberbullies, cyberactivists, cyberpredators : film, TV, and Internet stereotypes
\"Written by an expert in media, popular culture, gender, and sexuality, this book surveys the common archetypes of Internet users--from geeks, nerds, and gamers to hackers, scammers, and predators--and assesses what these stereotypes reveal about our culture's attitudes regarding gender, technology, intimacy, and identity. Provides exhaustively researched and richly detailed information about the interplay between media representations of Internet users and gender, politics, technology, and society that is fascinating and fun to read; Presents findings that suggest that in spite of the Internet being so prevalent, technophobia is still an inherent subtext of many pop culture references to it; Considers how the vast majority of the portrayals of Internet user stereotypes are male--and evaluates how these male-dominated roles shape and are shaped by popular attitudes about sexuality, technology, intimacy, and identity\"-- Provided by publisher.
Python GUI programming with tkinter : develop responsive and powerful GUI applications with tkinter
Tkinter is a lightweight, portable, and easy-to-use graphical toolkit available in the Python Standard Library. Due to its simplicity and availability, it is widely used to build GUIs in Python. This book teaches how to design and build a functional, appealing, and user-friendly GUI using one of the most powerful languages: Python with Tkinter.
Qt5 Python GUI Programming Cookbook
QT5 Python GUI Programming Cookbook will guide you from the very basics of creating a fully functional GUI application using PyQT with only a few lines of code. Each recipe adds more widgets to the GUIs we are creating. You will learn how easy it is to get started and you might be surprised how advanced you can become in just a short time of coding.