This book is a practical guide to testing in Moodle. You will initially learn to create different types of questions such as True/False, multiple choice, short answer, and so on. After you have learned how to create questions you will follow a step-by-step process to create complete tests by tweaking various options. Once you have gone...
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as...
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...
Deformable surface 3D reconstruction from monocular images is an active area of research in the
Computer Vision community. This encompasses recovering both the shape of thin objects that can
be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects.
Whereas this may seem easy for a human...
The ultimate, definitive programming language has not been created yet, far from it.
Almost every day a new language is created, and new functionalities are added to
existing languages. Improvements in programming languages contribute to making
programs more reliable, shorten the development time, and make programs easier
to...
Three-dimensional (3D) integrated circuit (IC) stacking is the next big step in electronic system integration. It enables packing more functionality, as well as integration of heterogeneous materials, devices, and signals, in the same space (volume). This results in consumer electronics (e.g., mobile, handheld devices) which can run more...
More and more people are discovering how to use storytelling to bring about change and reinforce learning. In this book, Margaret Parkin combines these two approaches into a powerful and effective technique to assist personal change.
Showing how and when to use stories to maximum effect, Parkin...
An overview of the visual arts fundamentals, Moving the Eye Through 2-D Design provides a step-by-step approach to understanding what causes us to look at a painting, photograph, or any two-dimensional media and what is needed to maintain visual interest. This volume introduces a goal-oriented method that applies aspects of line,...
Koha is the first full-featured open source library management system that is widely used for efficiently managing libraries. However, setting up and maintaining Koha is no walk in the park. It is not as straightforward as setting up the other popular LAMP applications.
This practical guide provides all the essential information...
This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...
This book is designed to cover all of the aspects of InfoPath 2010 within a SharePoint 2010 environment in regards to creating and developing business solutions. It is geared toward both technical and semi-technical professionals and does not require a degree in computer programming to utilize.
Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian...