![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
In recent years, mobile technology and the internet of objects have been used in mobile networks to meet new technical demands. Emerging needs have centered on data storage, computation, and low latency management in potentially smart cities, transport, smart grids, and a wide number of sustainable environments. Federated learning's contributions include an effective framework to improve network security in heterogeneous industrial internet of things (IIoT) environments. Demystifying Federated Learning for Blockchain and Industrial Internet of Things rediscovers, redefines, and reestablishes the most recent applications of federated learning using blockchain and IIoT to optimize data for next-generation networks. It provides insights to readers in a way of inculcating the theme that shapes the next generation of secure communication. Covering topics such as smart agriculture, object identification, and educational big data, this premier reference source is an essential resource for computer scientists, programmers, government officials, business leaders and managers, students and faculty of higher education, researchers, and academicians.
Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.
Developed by Professionals and Experienced Teachers from top schools across the country, the book has been divided into five sections namely Word Structure and Knowledge, Reading Comprehension, Spoken and Written Expressions, Achievers section, Model Papers. The concepts have been explained in brief through solved examples and Illustrations. To enhance the problem solving skills of candidates, Multiple Choice Questions (MCQs) with detailed solutions have been provided at the end of each chapter. Two Mock Test Papers have been provided for practice purpose. A CD containing Study Chart for systematic preparation, Tips & Tricks to crack English Olympiad, Pattern of exam, and links of Previous Years Papers is accompanied with this book. The book is recommended for various school level and competitive exams. #v&spublishers
The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography
Information Security is usually achieved through a mix of
technical, organizational and legal measures. These may include the
application of cryptography, the hierarchical modeling of
organizations in order to assure confidentiality, or the
distribution of accountability and responsibility by law, among
interested parties.
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.
Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas.
INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitalism. On the margins of the traditional duo of knowledge markets and exclusive property rights, the emerging notion of cultural commons is opening the door to new modes of production based on hybrid market arrangements and an inclusive understanding of property. This book studies the political economy of cultural commons in the digital ecosystem, outlining the contexts and areas of thought in which this concept has emerged and identifying the socio-economic, technical and political issues associated with it. It also analyzes the specific physical conditions that enable the implementation of the economy of cultural commons in a specific digital ecosystem, that of books, by studying the effects of digital libraries and self-publishing platforms.
Millions of users have taken up residence in virtual worlds, and in those worlds they find opportunities to revisit and rewrite their religious lives. Robert Geraci argues that virtual worlds and video games have become a locus for the satisfaction of religious needs, providing many users with communities, a meaningful experience of history and human activity, and a sense of transcendence. Using interviews, surveys, and his own first-hand experience within the games, Geraci shows how World of Warcraft and Second Life provide participants with the opportunity to rethink what it means to be religious in the contemporary world. Not all participants use virtual worlds for religious purposes, but many online residents use them to rearrange or replace religious practice as designers and users collaborate in the production of a new spiritual marketplace. Using World of Warcraft and Second Life as case studies, this book shows that many residents now use virtual worlds to re-imagine their traditions and work to restore them to authentic sanctity, or else replace religious institutions with virtual communities that provide meaning and purpose to human life. For some online residents, virtual worlds are even keys to a post-human future where technology can help us transcend mortal life. Geraci argues that World of Warcraft and Second Life are virtually sacred because they do religious work. They often do such work without regard for and frequently in conflict with traditional religious institutions and practices; ultimately they participate in our sacred landscape as outsiders, competitors, and collaborators.
Healthcare Information Systems and Informatics: Research and Practices compiles estimable knowledge on the research of information systems and informatics applications in the healthcare industry. This book addresses organizational issues, including technology adoption, diffusion, and acceptance, as well as cost benefits and cost effectiveness, of advancing health information systems and informatics applications as innovative forms of investment in healthcare. Rapidly changing technology and the complexity of its applications make this book an invaluable resource to researchers and practitioners in the healthcare fields.
The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties. The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.
This two-volume book set explores how sensors and computer vision technologies are used for the navigation, control, stability, reliability, guidance, fault detection, self-maintenance, strategic re-planning and reconfiguration of unmanned aircraft systems (UAS). Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor Data Fusion, Vision in Micro-Aerial Vehicles (MAVs), Computer Vision in UAV using ROS, Security Aspects of UAV and Robot Operating System, Vision in Indoor and Outdoor Drones, Sensors and Computer Vision, and Small UAV for Persistent Surveillance. Volume 2 focuses on UAS deployment and applications including UAV-CPSs as a Testbed for New Technologies and a Primer to Industry 5.0, Human-Machine Interface Design, Open Source Software (OSS) and Hardware (OSH), Image Transmission in MIMO-OSTBC System, Image Database, Communications Requirements, Video Streaming, and Communications Links, Multispectral vs Hyperspectral Imaging, Aerial Imaging and Reconstruction of Infrastructures, Deep Learning as an Alternative to Super Resolution Imaging, and Quality of Experience (QoE) and Quality of Service (QoS).
This Handbook provides a complete compendium of methods for
evaluation of IT-based systems and solutions within healthcare.
Emphasis is entirely on assessment of the IT-system within its
organizational environment. The author provides a coherent and
complete assessment of methods addressing interactions with and
effects of technology at the organizational, psychological, and
social levels.
As the Internet has evolved to become an integral part of modern society, the need for better quality assurance practices in web engineering has heightened. Adherence to and improvement of current standards ensures that overall web usability and accessibility are at optimum efficiency. Design Solutions for Improving Website Quality and Effectiveness is an authoritative reference source for the latest breakthroughs, techniques, and research-based solutions for the overall improvement of the web designing process. Featuring relevant coverage on the analytics, metrics, usage, and security aspects of web environments, this publication is ideally designed for reference use by engineers, researchers, graduate students, and web designers interested in the enhancement of various types of websites.
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The main contributions are based on the results of the FP7 European Projects ROMEO, which focus on new methods for the compression and delivery of 3D multi-view video and spatial audio, as well as the optimization of networking and compression jointly across the Future Internet (www.ict-romeo.eu). The delivery of 3D media to individual users remains a highly challenging problem due to the large amount of data involved, diverse network characteristics and user terminal requirements, as well as the user s context such as their preferences and location. As the number of visual views increases, current systems will struggle to meet the demanding requirements in terms of delivery of constant video quality to both fixed and mobile users. ROMEO will design and develop hybrid-networking solutions that combine the DVB-T2 and DVB-NGH broadcast access network technologies together with a QoE aware Peer-to-Peer (P2P) distribution system that operates over wired and wireless links. Live streaming 3D media needs to be received by collaborating users at the same time or with imperceptible delay to enable them to watch together while exchanging comments as if they were all in the same location. The volume provides state-of-the-art information on 3D multi-view video, spatial audio networking protocols for 3D media, P2P 3D media streaming, and 3D Media delivery across heterogeneous wireless networks among other topics. Graduate students and professionals in electrical engineering and computer science with an interest in 3D Future Internet Media will find this volume to be essential reading."
In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.
Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation. |
You may like...
Hardy Type Inequalities on Time Scales
Ravi P. Agarwal, Donal O'Regan, …
Hardcover
R3,741
Discovery Miles 37 410
|