Informatyka
Remo Laubacher
Creating a concrete5 theme isn't complicated if there’s already a HTML document. There are only very few PHP functions you’ll have to add, but those are powerful and give you a lot of freedom. As you’ll learn to create mobile ready themes, you’ll start to see that there’s almost no limit in what you can do.Creating Concrete5 Themes is a practical, hands-on guide that provides you with a number of examples that will teach you how to create powerful concrete5 themes, change the look of content block elements, and even make your site ready for mobile devices.Creating Concrete5 Themes starts with a few words about the editing concept and architecture of concrete5 and then continues with the creation of a basic theme which gets extended with more and more elements until the theme is mobile ready.You will learn where to find the information necessary to get your own concrete5 site and then get a quick introduction to understand the idea of the in-site editing concept. We’ll then create a theme which is extended with features and more details as we progress. You’ll also see some examples to show you the process of overriding elements from the core without losing the ability to upgrade concrete5 in the future. Once we’ve customized every element in concrete5 to build a complete theme, we’ll have a look at responsive techniques to make your site ready for small screen devices such as mobile phones and tablets.
MICHAEL KEITH PEACOCK
If you are a developer who wants to have your development environment accurately reflect your live servers to tackle the ever-increasing complexity of web and software projects, this book is most certainly intended for you!It's assumed that you know the basics of Linux systems in the context of web-based projects.
Jim Wilson
To create a dynamic and multi-pane user interface on Android, you need to encapsulate UI components and activity behaviors into modules that you can swap into and out of your activities. You can create these modules with the fragment class, which behaves somewhat like a nested activity that can define its own layout and manage its own lifecycle. When a fragment specifies its own layout, it can be configured in different combinations with other fragments inside an activity to modify your layout configuration for different screen sizes (a small screen might show one fragment at a time, but a large screen can show two or more).Creating Dynamic UI with Android Fragments shows you how to create modern Android applications that meet the high expectations of today's users. You will learn how to incorporate rich navigation features like swipe-based screen browsing and how to create adaptive UIs that ensure your application looks fantastic whether run on a low cost smartphone or the latest tablet.This book looks at the impact fragments have on Android UI design and their role in both simplifying many common UI challenges and providing new ways to incorporate rich UI behaviors.You will learn how to use fragments to create UIs that automatically adapt to device differences. We look closely at the roll of fragment transactions and how to work with the Android back stack. Leveraging this understanding, we then explore several specialized fragment-related classes like ListFragment and DialogFragment as well as rich navigation features like swipe-based screen browsing.
Jim Wilson
Today’s users expect mobile apps to be dynamic and highly interactive, with rich navigation features. These same apps must look fantastic whether running on a medium-resolution smartphone or high-resolution tablet. Fragments provide the toolset we need to meet these user expectations by enabling us to build our applications out of adaptable components that take advantage of the rich capabilities of each individual device and automatically adapt to their differences.This book looks at the impact fragments have on Android UI design and their role in both simplifying many common UI challenges and in providing best practices for incorporating rich UI behaviors. We look closely at the roll of fragment transactions and how to work with the Android back stack. Leveraging this understanding, we explore several specialized fragment-related classes such as ListFragment and DialogFragment. We then go on to discuss how to implement rich navigation features such as swipe-based screen browsing, and the role of fragments when developing applications that take advantage of the latest aspects of Material Design. You will learn everything you need to provide dynamic, multi-screen UIs within a single activity, and the rich UI features demanded by today’s mobile users.
Paul Nygard
Cocos2d for iPhone is a simple (but powerful) 2D framework that makes it easy to create games for the iPhone. There are thousands of games in the App Store already using cocos2d. Game development has never been this approachable and easy to get started.Creating Games with cocos2d for iPhone 2 takes you through the entire process of designing and building nine complete games for the iPhone, iPod Touch, or iPad using cocos2d 2.0. The projects start simply and gradually increase in complexity, building on the lessons learned in previous chapters. Good design practices are emphasized throughout.From a simple match game to an endless runner, you will learn how to build a wide variety of game styles.You will learn how to implement animation, actions, create artificial randomness, use the Box2D physics engine, create tile maps, and even use Bluetooth to play between two devices.Creating games with cocos2d for iPhone 2 will take your game building skills to the next level.
Jakub Sanecki
Designing good looking, professional quality web templates or building your own website are rather complicated tasks, demanding a lot of technical and graphical expertise. Artisteer has changed this situation, enabling you to do it by yourself, without the need to learn skills such as HTML, web-programming languages, or drawing.Creating stunning Templates with Artisteer is a practical, step-by-step guide that will show you how you can prepare an elegant, professional looking website, on your own, using features of Artisteer. It also describes the process of designing templates for various popular CMS platforms like WordPress or Joomla!, by giving you practical hints, showing how to install those templates and how to import the content into CMS. Creating stunning Templates with Artisteer leads you through the process of designing a website, including all standard layout elements, from header to the footer, including menus and special boxes. You will learn how to prepare the templates, store them and export them in the form of ready-to-use HTML pages or packages that can be installed in various CMS platforms such as WordPress, Joomla!, Drupal, or DotNetNuke. The last part of the book shows you some tips and tricks that allow you to extend standard themes generated by Artisteer for enriching the website with image gallery, combining two menus, and more.You will learn how to create a professional quality website or CMS template on your own, with the use of Artisteer with minimal technical difficulties.
Marc Delisle
For most of us, setting up the database for an application is often an afterthought. While you don't need to be a professional database designer to create a working application, knowing a few insider tips and techniques can make both the process easier and the end result much more effective. This book doesn't set out to make you an expert in data analysis, but it does provide a quick and easy way to raise your game in this essential part of getting your application right.
Dr. Alex Antic, John K. Thompson
A Gartner prediction in 2018 led to numerous articles stating that 85% of AI and machine learning projects fail to deliver.” Although it's unclear whether a mass extinction event occurred for AI implementations at the end of 2022, the question remains: how can I ensure that my project delivers value and doesn't become a statistic?The demand for data scientists has only grown since 2015, when they were dubbed the new “rock stars” of business. But how can you become a data science rock star? As a new senior data leader, how can you build and manage a productive team? And what is the path to becoming a chief data officer?Creators of Intelligence is a collection of in-depth, one-on-one interviews where Dr. Alex Antic, a recognized data science leader, explores the answers to these questions and more with some of the world's leading data science leaders and CDOs.Interviews with: Cortnie Abercrombie, Edward Santow, Kshira Saagar, Charles Martin, Petar Veličković, Kathleen Maley, Kirk Borne, Nikolaj Van Omme, Jason Tamara Widjaja, Jon Whittle, Althea Davis, Igor Halperin, Christina Stathopoulos, Angshuman Ghosh, Maria Milosavljevic, Dr. Meri Rosich, Dat Tran, and Stephane Doyen.
Dr. Alex Antic, John K. Thompson
A Gartner prediction in 2018 led to numerous articles stating that 85% of AI and machine learning projects fail to deliver.” Although it's unclear whether a mass extinction event occurred for AI implementations at the end of 2022, the question remains: how can I ensure that my project delivers value and doesn't become a statistic?The demand for data scientists has only grown since 2015, when they were dubbed the new “rock stars” of business. But how can you become a data science rock star? As a new senior data leader, how can you build and manage a productive team? And what is the path to becoming a chief data officer?Creators of Intelligence is a collection of in-depth, one-on-one interviews where Dr. Alex Antic, a recognized data science leader, explores the answers to these questions and more with some of the world's leading data science leaders and CDOs.Interviews with: Cortnie Abercrombie, Edward Santow, Kshira Saagar, Charles Martin, Petar Veličković, Kathleen Maley, Kirk Borne, Nikolaj Van Omme, Jason Tamara Widjaja, Jon Whittle, Althea Davis, Igor Halperin, Christina Stathopoulos, Angshuman Ghosh, Maria Milosavljevic, Dr. Meri Rosich, Dat Tran, and Stephane Doyen.
Dan Tracy, Sean P Tracy
With every successive console generation, the cost, time, and complexity of developing games has grown. Meet CryENGINE3, a middleware engine that is the perfect fit for most developers allowing users to exceed current generation quality standards while using less people and time than ever thought possible.The CryENGINE3 CookBook is packed full of recipes for junior and senior developers alike. It covers everything from creating photo realistic architectural visualizations to implementing advanced physics such as ragdoll and tornado effects. Topics covered include the sandbox, level layout, environment creation, AI, character creation, creating vehicles, and game logic. Every recipe is designed to add AAA quality to your games. The CryENGINE3 SDK has many tools immediately available to developers of all disciplines. For designers the book has recipes for building up your own levels and populating your levels with intelligent AI and photo realistic assets. For artists we have recipes for practical workflow tools and techniques used when working with the advanced CryENGINE shaders and materials. For animators we have recipes that will bring your creations to life using skinned characters and advanced animation systems like locomotion groups. Finally for programmers we have recipes that show how to employ the core mechanics behind entities such as vehicles and weapons while also utilizing the strengths of the physics engine to create a unique and exciting game.
Mercury Learning and Information, Oswald Campesato
This book is an essential guide for mastering advanced CSS3 and SVG techniques, ideal for web developers aiming to create visually striking and interactive web content. It starts with an in-depth look at CSS3, covering shadow effects, gradients, 2D and 3D transforms, and sophisticated animations. You'll learn to implement complex styling, use media queries for responsive design, and create dynamic keyframe animations. Security practices and effective use of CSS3 are also addressed.Moving to SVG, the book explores creating scalable vector graphics for advanced data visualizations and animations. You'll learn to use SVG elements like shapes, gradients, and Bezier curves, and how to seamlessly integrate them with CSS3 for dynamic, interactive graphics. Detailed tutorials on SVG filters, transforms, and animations enable you to build intricate visual effects and engaging content. Practical examples show how to combine CSS3 and SVG for responsive, high-performance web projects.By the end, you’ll have the skills to craft compelling web applications using CSS3 and SVG, whether you're a beginner or an experienced developer looking to elevate your web design expertise.
CSS3 and SVG with Gemini. Explore advanced CSS3 and SVG techniques with Gemini technology
Mercury Learning and Information, Oswald Campesato
This book serves as a comprehensive guide to mastering CSS3 and SVG technologies, with a focus on their integration with Gemini. It begins with an introduction to Generative AI and prompt engineering, laying the foundation for using Gemini effectively. Detailed chapters explore CSS3 fundamentals and advanced 3D animation techniques, offering practical examples to enhance understanding.The book dives into scalable vector graphics (SVG) basics, advancing into complex designs, and demonstrates how to integrate SVG with Gemini for creating dynamic visuals. Structured to cater to both beginners and advanced learners, each chapter provides in-depth coverage of concepts and hands-on exercises to apply knowledge practically.Readers will gain skills to create professional-grade graphics and animations, leveraging the power of Gemini and combining it with CSS3 and SVG. This resourceful book is ideal for web developers, designers, and anyone aiming to expand their expertise in modern web technologies.
CSS3 and SVG with GPT-4. Explore CSS3 animations and SVG techniques with GPT-4 insights
Mercury Learning and Information, Oswald Campesato
This book is your gateway to exploring the seamless integration of CSS3, SVG, and GPT-4. It begins by introducing the fundamentals of GPT-4 and generative AI, setting a solid foundation for understanding its capabilities. Alongside, you'll learn prompt engineering techniques to effectively interact with AI tools.The journey progresses into CSS3, covering its core principles and advanced features such as 3D animations. You'll discover innovative ways to integrate GPT-4 into web design processes, creating dynamic and visually engaging content. The book also delves into Scalable Vector Graphics (SVG), offering insights into creating scalable and crisp graphics. Combining SVG with GPT-4, you'll uncover new possibilities for unique designs.By the end, you'll have mastered the tools and techniques to harness AI-driven creativity, making your web development projects more efficient and imaginative. This book is perfect for designers, developers, and anyone looking to explore the intersection of AI and design.
CSS3 and SVG with Meta AI. AI-Driven CSS3 and SVG Design Techniques for Modern Web Solutions
Mercury Learning and Information, Oswald Campesato
This book introduces the innovative integration of CSS3 and SVG with generative AI tools, providing a foundation for modern web design. Readers begin by exploring the basics of generative AI and prompt engineering, gaining insights into how these technologies influence visual storytelling and creativity in web design.Progressing through the chapters, the book covers essential CSS3 concepts, including 3D animations and dynamic styling, before delving into advanced SVG techniques for creating scalable and responsive vector graphics. With practical examples, readers learn to merge CSS3 and SVG, enabling the development of seamless AI-enhanced animations and graphics tailored to modern design needs. The integration of Meta AI is highlighted, showcasing its role in enhancing workflows and achieving innovative solutions.By the end, readers will have gained the skills to create cutting-edge, scalable, and visually engaging web designs. The book equips developers with the knowledge and tools to incorporate AI-driven enhancements into their projects, ensuring designs remain both innovative and practical for real-world applications.
CSS3 and SVG with Meta AI. AI-Driven CSS3 and SVG Design Techniques for Modern Web Solutions
Mercury Learning and Information, Oswald Campesato
This book introduces the innovative integration of CSS3 and SVG with generative AI tools, providing a foundation for modern web design. Readers begin by exploring the basics of generative AI and prompt engineering, gaining insights into how these technologies influence visual storytelling and creativity in web design.Progressing through the chapters, the book covers essential CSS3 concepts, including 3D animations and dynamic styling, before delving into advanced SVG techniques for creating scalable and responsive vector graphics. With practical examples, readers learn to merge CSS3 and SVG, enabling the development of seamless AI-enhanced animations and graphics tailored to modern design needs. The integration of Meta AI is highlighted, showcasing its role in enhancing workflows and achieving innovative solutions.By the end, readers will have gained the skills to create cutting-edge, scalable, and visually engaging web designs. The book equips developers with the knowledge and tools to incorporate AI-driven enhancements into their projects, ensuring designs remain both innovative and practical for real-world applications.
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
Digit Oktavianto, Iqbal Muhardianto
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.
Ankur Shah
This book takes a tutorial approach and each chapter contains step-wise instructions to perform specific tasks. This book is for Linux/Unix System Administrators interested in designing and setting up a CUPS network and provides enough knowledge to understand how the technology works, make decisions about deployment, and then implement a stable work environment. No knowledge in CUPS is required but readers need to be comfortable with working in the Linux/Unix environment. On the whole, readers should have basic knowledge of the Linux environment.
Matti Paukkonen
Explore the robust functionalities of SharePoint that ensure your business processes remain flexible and scalable. With its custom development features, SharePoint presents abundant opportunities to meet evolving needs, deliver personalized experiences, and seamlessly integrate across platforms. If you’re looking for practical guidance on developing custom SharePoint solutions, Customizing and Extending SharePoint Online is your essential companion.This book takes you through the different techniques for customizing SharePoint, harnessing its native capabilities, and extending them across other platforms. You’ll begin by organizing content with SharePoint sites and learning best practices for permission governance before learning how to create and manage pages and use web parts to create, aggregate, and format content. This SharePoint book also covers specialized use cases of the Viva Suite and delves into SharePoint automation with Power Automate while extending solutions with Power Apps. Toward the end, you’ll get to grips with designing personalized solutions with SharePoint Framework and Microsoft Graph.By the end of this book, you’ll be ready to deliver highly customized SharePoint solutions that align with your business objectives.
Jürgen Gutsch
ASP.NET Core is packed full of hidden features for building sophisticated web applications – but if you don’t know how to customize it, you’re not making the most of its capabilities. Customizing ASP.NET Core 6.0 is a book that will teach you all about tweaking the knobs at various layers and take experienced programmers’ skills to a new level.This updated second edition covers the latest features and changes in the .NET 6 LTS version, along with new insights and customization techniques for important topics such as authentication and authorization. You’ll also learn how to work with caches and change the default behavior of ASP.NET Core apps.This book will show you the essential concepts relating to tweaking the framework, such as configuration, dependency injection, routing, action filters, and more. As you progress, you'll be able to create custom solutions that meet the needs of your use case with ASP.NET Core. Later chapters will cover expert techniques and best practices for using the framework for your app development needs, from UI design to hosting. Finally, you'll focus on the new endpoint routing in ASP.NET Core to build custom endpoints and add third-party endpoints to your web apps for processing requests faster.By the end of this book, you'll be able to customize ASP.NET Core to develop better, more robust apps.
Gopi Kondameda
In the evolving remote working arrangement, the demand for custom Microsoft Teams apps is increasing rapidly across businesses. If you are someone who aims to provide users with an exceptional experience through custom-built apps that adhere to industry standards and good governance, Customizing Microsoft Teams is for you!The book starts with an overview of Microsoft Teams customization and configuration prerequisites. It then shows you how to expose functionalities from various solutions through tabs, connectors, messaging extensions, and more before you move on to explore how the PowerShell module can manage multiple aspects of administration and how to use the SharePoint Framework for creating custom Microsoft Teams apps. You’ll be able to work with Microsoft Dataverse for Teams to build custom apps, bots, and flows using Power Apps, Power Virtual Agents, and Power Automate. As you publish your production-ready apps on the Teams store and Microsoft AppSource, you’ll also understand Teams app analytics and reporting functionalities.By the end of this book, you’ll have learned how to develop custom solutions to solve critical business problems and extend the power of Microsoft Teams to develop high-value use cases in the remote working culture.
Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications
IT Governance Publishing, Alan Calder
This book is a practical guide to achieving Cyber Essentials certification, a key step in protecting your organization from cyber threats. It starts with an overview of the Cyber Essentials scheme and explains why certification is crucial. The book covers common cyber attacks like ransomware, social engineering, and denial of service, helping you understand potential threats.It then explores essential technical controls needed for certification, such as firewalls, secure configurations, user access control, and malware protection. It also highlights best practices like managing security updates to keep systems secure. Each chapter offers actionable advice on implementing these controls, emphasizing their role in strengthening your cybersecurity framework.The book concludes with a detailed look at the Cyber Essentials certification process. It guides you through preparing for certification, completing the checklist, and undergoing the assessment. Additional resources and tips for Cyber Essentials Plus certification are included for those seeking further guidance.This comprehensive guide provides the knowledge and tools to secure your organization, achieve certification, and maintain strong cybersecurity resilience.
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
IT Governance Publishing, Alan Calder
In today’s rapidly evolving digital landscape, cybersecurity is essential for protecting organizations from cyber threats. This book provides a thorough guide to building cyber resilience, starting with an in-depth understanding of the ever-changing cyber threat landscape. It covers foundational principles such as risk management, security controls, and defense-in-depth strategies, giving readers the knowledge needed to secure digital systems effectively.The book then delves into actionable cybersecurity controls, offering insights on asset management, identity and access control, encryption, and incident response management. Each section includes practical tips for implementation, ensuring that readers can apply these strategies in real-world scenarios. The goal is to help organizations not only understand cybersecurity but also to establish robust security policies and protocols to prevent and mitigate potential risks.Finally, the book emphasizes the importance of continual improvement and monitoring to maintain a resilient cybersecurity framework. It highlights the need for regular audits, vulnerability scanning, and staff training to adapt to new threats. By the end, readers will be equipped to build and sustain a resilient cybersecurity strategy that ensures long-term protection and business continuity.
Gourav Nagar, Shreyas Kumar, Rohit Ghai
Gain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework. This guide walks you through each stage of the attack, from reconnaissance and weaponization to exploitation, command and control (C2), and actions on objectives. Written by cybersecurity leaders Gourav Nagar, Director of Information Security at BILL Holdings, with prior experience at Uber and Apple, and Shreyas Kumar, Professor of Practice at Texas A&M, and former expert at Adobe and Oracle, this book helps enhance your cybersecurity posture. You’ll gain insight into the role of threat intelligence in boosting the cyber kill chain, explore the practical applications of the framework in real-world scenarios, and see how AI and machine learning are revolutionizing threat detection. You’ll also learn future-proofing strategies and get ready to counter sophisticated threats like supply chain attacks and living-off-the-land attacks, and the implications of quantum computing on cybersecurity.By the end of this book, you’ll have gained the strategic understanding and skills needed to protect your organization's digital infrastructure in the ever-evolving landscape of cybersecurity.*Email sign-up and proof of purchase required.
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna...
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działania w tej sferze, w tym na zapobieganie incydentom mającym niekorzystny wpływ na bezpieczeństwo systemów informacyjnych, a działania takie są ujęte właśnie w strategiach cyberbezpieczeństwa. Prof. Dr hab. Mirosław Karpiuk Zaprezentowane badania cechuje dojrzałość naukowa oraz doskonała znajomość tematyki, która nie ogranicza się jedynie do realiów polskich. Autorki bowiem wnikliwie omawiają i analizują także kształtowanie się systemu cyberbezpieczeństwa w Stanach Zjednoczonych Ameryki, Kanadzie, Francji i Republice Federalnej Niemiec. [...] W recenzowanej monografii można wyróżnić dwie części. Pierwsza jest o charakterze teoretycznym, w której Autorki koncentrują się na aspektach bezpieczeństwa cyberprzestrzeni jako elementu polityki państwa oraz na miejscu cyberbezpieczeństwa w systemie bezpieczeństwa. W drugiej natomiast zostały poddane analizie obowiązujące oraz przyjęte w ubiegłych latach w wybranych państwach strategie i polityki cyberbezpieczeństwa. dr Justyna Kurek 2) SYSTEM BEZPIECZEŃSTWA W CYBERPRZESTRZENI RP Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji opracowanie, o niezwykle nośnym i ambitnym tytule System bezpieczeństwa w cyberprzestrzeni RP, dotykające niezwykle ważnej współcześnie problematyki cyberbezpieczeństwa jest dziełem zbiorowym, gdzie znajduje ujście wiele ciekawych wątków związanych z zakreślonym w tytule obszarem. dr hab. Mirosław Karpiuk, prof. UWM
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
Marian Kowalewski, Marek Jakubiak
Wśród zagrożeń w cyberprzestrzeni szczególnie groźne jest zagrożenie cyberprzemocy – zagrożenie, które nie zawsze się dostrzega i wielokrotnie wręcz lekceważy, a które coraz częściej dotyka nas wszystkich. Najogólniej ujmując, cyberprzemoc możemy sprowadzić do prześladowania, zastraszania, szantażowania, nękania, obrażania i wyśmiewania innych osób lub grup za pośrednictwem współczesnych technik i technologii ICT. Prezentowana publikacja jest zbiorem wyników badań pracowników naukowo-dydaktycznych Zakładu Nauk o Administracji i Bezpieczeństwa w Administracji z Wydziału Administracji i Nauk Społecznych Politechniki Warszawskiej, które są upowszechniane i wykładane w procesie dydaktycznym.