This open access book presents the assessment framework for IEA’s International Computer an Information Literacy Study (ICILS) 2018, which is designed to assess how well students are prepared for study, work and life in a digital world. The study measures international differences in students’ computer and information literacy (CIL): their ability to use computers to investigate, create, pa…
Buku akses terbuka ini merupakan hasil dari prosiding Konferensi Internasional ke-32 tentang Penalaran Otomatis dengan Tableaux Analitik dan Metode Terkait, TABLEAUX 2023, yang diadakan di Praha, Republik Ceko, selama 18-21 September 2023. 20 makalah lengkap dan 5 makalah pendek yang disertakan dalam buku ini bersama dengan 5 abstrak ceramah yang diundang ditinjau dan dipilih dengan saksama dar…
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware …
Buku akses terbuka ini merupakan hasil dari Konferensi Internasional ke-29 tentang Deduksi Otomatis, Konferensi tentang Pengurangan Otomatis (CADE, Conference on Automated Deduction) 29, yang berlangsung di Roma, Italia, selama bulan Juli 2023. 28 makalah lengkap dan 5 makalah pendek yang disajikan telah ditinjau dan dipilih secara saksama dari 77 kiriman. CADE adalah forum utama untuk penyajia…
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times—a huge leap forward in byte-addressable capacity compared with current DRAM offerings. This revolution…
This open access book constitutes the refereed proceedings of the First International Conference on VR Technologies in Cultural Heritage, VRTCH 2018, held in Brasov, Romania in May 2018. The 13 revised full papers along with the 5 short papers presented were carefully reviewed and selected from 21 submissions. The papers of this volume are organized in topical sections on data acquisition and…
This open access book provides the first critical history of the controversy over whether to cull wild badgers to control the spread of bovine tuberculosis (bTB) in British cattle. This question has plagued several professional generations of politicians, policymakers, experts and campaigners since the early 1970s. Questions of what is known, who knows, who cares, who to trust and what to do ab…
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Th…
This chapter offers an introduction to the book and is specifically recommended for all readers intending to do the practical exercises it contains. It also provides readers with all the information they require to make the most of the book’s contents. In this chapter, we explain the aim, structure and intended audience for this book. We also give the readers a few tips and guidelines a…