Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing
- Curating Social Data - Summarizing Social Data - Analyzing Social Data - Social Data Analytics Applications: Trust, Recommender Systems, Cognitive Analytics
'This is the most important conversation of our time, and Tegmark's thought-provoking book will help you join it' Stephen Hawking THE INTERNATIONAL BESTSELLER. DAILY TELEGRAPH AND THE TIMES BOOKS OF THE YEAR SELECTED AS ONE OF BARACK OBAMA'S FAVOURITE BOOKS OF 2018 AI is the future - but what will that future look like? Will superhuman intelligence be our slave, or become our god? Taking us to the heart of the latest thinking about AI, Max Tegmark, the MIT professor whose work has helped mainstream research on how to keep AI beneficial, separates myths from reality, utopias from dystopias, to explore the next phase of our existence. How can we grow our prosperity through automation, without leaving people lacking income or purpose? How can we ensure that future AI systems do what we want without crashing, malfunctioning or getting hacked? Should we fear an arms race in lethal autonomous weapons? Will AI help life flourish as never before, or will machines eventually outsmart us at all tasks, and even, perhaps, replace us altogether? 'This is a rich and visionary book and everyone should read it' The Times
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
The first of its kind, this anthology in the burgeoning field of technology ethics offers students and other interested readers 32 chapters, each written in an accessible and lively manner specifically for this volume. The chapters are conveniently organized into five parts: I. Perspectives on Technology and its Value II. Technology and the Good Life III. Computer and Information Technology IV. Technology and Business V. Biotechnologies and the Ethics of Enhancement A hallmark of the volume is multidisciplinary contributions both (1) in "analytic" and "continental" philosophies and (2) across several hot-button topics of interest to students, including the ethics of autonomous vehicles, psychotherapeutic phone apps, and bio-enhancement of cognition and in sports. The volume editors, both teachers of technology ethics, have compiled a set of original and timely chapters that will advance scholarly debate and stimulate fascinating and lively classroom discussion. Downloadable eResources (available from www.routledge.com/9781032038704) provide a glossary of all relevant terms, sample classroom activities/discussion questions relevant for chapters, and links to Stanford Encyclopedia of Philosophy entries and other relevant online materials. Key Features: Examines the most pivotal ethical questions around our use of technology, equipping readers to better understand technology's promises and perils. Explores throughout a central tension raised by technological progress: maintaining social stability vs. pursuing dynamic social improvements. Provides ample coverage of the pressing issues of free speech and productive online discourse.
This book aims to help the reader better understand the importance of data analysis in project management. Moreover, it provides guidance by showing tools, methods, techniques and lessons learned on how to better utilize the data gathered from the projects. First and foremost, insight into the bridge between data analytics and project management aids practitioners looking for ways to maximize the practical value of data procured. The book equips organizations with the know-how necessary to adapt to a changing workplace dynamic through key lessons learned from past ventures. The book's integrated approach to investigating both fields enhances the value of research findings.
The Creative Electronic Music Producer examines the creative processes of electronic music production, from idea discovery and perception to the power of improvising, editing, effects processing, and sound design. Featuring case studies from across the globe on musical systems and workflows used in the production process, this book highlights how to pursue creative breakthroughs through exploration, trial and error tinkering, recombination, and transformation. The Creative Electronic Music Producer maps production's enchanting pathways in a way that will fascinate and inspire students of electronic music production, professionals already working in the industry, and hobbyists.
Write your own MAXScript functions and utilities to create custom
tools and UI elements, and automate repetitive tasks. Demonstrated
techniques include the creation of objects, arrays, collections,
control structures, parametric objects, and the construction of UI
elements. The companion CD-ROM contains media files that allow you
to practice the techniques with real-world examples demonstrating
how you can use then in a production environment.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
The Science of Deep Learning emerged from courses taught by the author that have provided thousands of students with training and experience for their academic studies, and prepared them for careers in deep learning, machine learning, and artificial intelligence in top companies in industry and academia. The book begins by covering the foundations of deep learning, followed by key deep learning architectures. Subsequent parts on generative models and reinforcement learning may be used as part of a deep learning course or as part of a course on each topic. The book includes state-of-the-art topics such as Transformers, graph neural networks, variational autoencoders, and deep reinforcement learning, with a broad range of applications. The appendices provide equations for computing gradients in backpropagation and optimization, and best practices in scientific writing and reviewing. The text presents an up-to-date guide to the field built upon clear visualizations using a unified notation and equations, lowering the barrier to entry for the reader. The accompanying website provides complementary code and hundreds of exercises with solutions.
The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
The Ethics of Artificial Intelligence in Education identifies and confronts key ethical issues generated over years of AI research, development, and deployment in learning contexts. Adaptive, automated, and data-driven education systems are increasingly being implemented in universities, schools, and corporate training worldwide, but the ethical consequences of engaging with these technologies remain unexplored. Featuring expert perspectives from inside and outside the AIED scholarly community, this book provides AI researchers, learning scientists, educational technologists, and others with questions, frameworks, guidelines, policies, and regulations to ensure the positive impact of artificial intelligence in learning.
Welcome to the Autodesk Media and Entertainment Official Training
Courseware for 3ds Max 8 software! Consider this book an all-access
pass to the production and training experience of Autodesk
developers and training experts. Written for self-paced learning or
instructor-led classroom training, the manual will teach you the
fundamentals of using 3ds Max 8. The book is organized into
sections dedicated to animation, modelling, materials, lighting and
rendering. Each section covers basic theory, and then includes
exercises for hands-on demonstration of the concept. By the end of
the book, you will have mastered the basics and moved onto
full-length projects. Flexibility is built in, so that you can
complete the tutorials in the way that works best for you. Complete
the book and you will be a seasoned 3ds Max pro, ready to work
confidently in a production environment.
Glen Goodman's goal was to retire young and wealthy, escaping the daily grind. He taught himself how to trade everything from shares to Bitcoin and made enough money to realise his dream and quit his day job while still in his 30s. In The Crypto Trader, Glen will show you exactly how he made huge profits trading Bitcoin, Ethereum, Ripple and more, so that you can do it too - without risking your shirt. Glen publicly called the top of the market in December 2017 and took his profits before the crash. But there are still tons of trading opportunities out there and Glen continues to trade crypto successfully. Inside you'll see his multi-hundred-percent gains on a raft of cryptocurrencies and learn how he builds his profits and holds onto them. Glen reveals all his trading strategies, the proven methods and rules that make him one of the most followed traders in the world on social media. (He is also frequently interviewed by the BBC, Forbes and LBC, and is a contributing expert on cryptocurrency at the London School of Economics.) It took Glen years of study and trial and error to become a consistent money maker. He learnt his trading lessons the hard way - so you don't have to. With The Crypto Trader by your side, you'll learn how to grab opportunities, make money - and keep it.
This textbook takes a case study approach to media and audience analytics. Realizing the best way to understand analytics in the digital age is to practice it, the authors have created a collection of cases using data sets that present real and hypothetical scenarios for students to work through. Media Analytics introduces the key principles of media economics and management. It outlines how to interpret and present results, the principles of data visualization and storytelling and the basics of research design and sampling. Although shifting technology makes measurement and analytics a dynamic space, this book takes an evergreen, conceptual approach, reminding students to focus on the principles and foundations that will remain constant. Aimed at upper-level students in the fast-growing area of media analytics in a cross-platform world, students using this text will learn how to find the stories in the data and to present those stories in an engaging way to others. Instructor and Student Resources include an Instructor's Manual, discussion questions, short exercises and links to additional resources. They are available online at www.routledge.com/cw/hollifield.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
Game Audio Fundamentals takes the reader on a journey through game audio design: from analog and digital audio basics, to the art and execution of sound effects, soundtracks, and voice production, as well as learning how to make sense of a truly effective soundscape. Presuming no pre-existing knowledge, this accessible guide is accompanied by online resources - including practical examples and incremental DAW exercises - and presents the theory and practice of game audio in detail, and in a format anyone can understand. This is essential reading for any aspiring game audio designer, as well as students and professionals from a range of backgrounds, including music, audio engineering, and game design.
The text focuses on the theory, design, and implementation of the Internet of Things (IoT), in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology. Features: Presents all the necessary information on the Internet of Things in modern computing Examines antenna integration challenges and constraints in the Internet of Things devices Discusses advanced Internet of Things networks and advanced controllers required for modern architecture Explores security and privacy challenges for the Internet of Things-based health care system Covers implementation of Internet of Things security protocols such as MQTT, Advanced Message Queuing Protocol, XMPP, and DSS The text addresses the issues and challenges in implementing communication and security protocols for IoT in modern computing. It further highlights the applications of IoT in diverse areas including remote health monitoring, remote monitoring of vehicle data and environmental characteristics, industry 4.0, 5G communications, and Next-gen IoT networks. The text presents case studies on IoT in modern digital computing. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology.
Drum Sound and Drum Tuning assists drummers, sound engineers, and music students in learning critical skills related to drum sound and achieving an optimised and personalised drum kit set-up. The book covers the essential theories of percussion acoustics and develops this knowledge in order to facilitate creative approaches to drum tuning and professional-level recording and mixing of drums. All aspects of drumhead vibration, drumhead equalisation, and resonant drumhead coupling are de-mystified, alongside discussions relating to drumhead types, drum shell vibration, and tuning to musical intervals for different performance genres. The book develops drum sound theory and creative analysis into a detailed dissection of recording and production techniques specifically for drums, including discussions on studio technologies, room acoustics, microphone techniques, phase coherence, and mixing drums with advanced digital audio workstation (DAW) techniques and creative processing tools. Drum Sound and Drum Tuning includes many practical hands-on exercises that incorporate example tutorials with Logic Pro and iDrumTune Pro software, encouraging the reader to put theory into immediate creative practice and to develop their own listening skills in an informed and reflective manner. The book also documents primary interviews and opinion from some of the world's most celebrated drummers, music producers, and sound engineers, enabling the reader to connect the relevant theories with real-world context, whilst refining their own personalised approach to mastering drum sound.
Make sure your students get the most from their online learning experiences Even though nearly every K-12 public school in the United States has broadband Internet access, the Web's vast potential as a teaching and learning tool has still not been realized. Web-based learning opportunities have been expensive, slow to develop, and time-consuming to implement, despite pressure on schools to adopt technology solutions that will cure their educational ills. Web-Based Learning in K-12 Classrooms: Opportunities and Challenges chronicles the up and downs of online learning and offers unique insights into its future, providing a comprehensive, curriculum-wide treatment of K-12 content areas (reading, science, mathematics, social studies), special education, counseling, virtual schools, exemplary schools, implementation issues, and educational Web sites. The Internet represents a powerful, complex set of technologies that offers your students access to unlimited knowledgebut that access doesn't replace the human interactions found in classrooms. Placing a student in front of a computer monitor is a supplement to classroom learning, not a substitute for it. Academics and education professionals address questions surrounding the key issues involved in successfully incorporating the wide range of Web-based learning opportunities (formal courses, demonstrations, simulations, collaborations, searches) into the classroom, including technology, content, and implementation. Web-Based Learning in K-12 Classrooms examines: inquiry-based learning online interaction displaying student work online Internet accessibility for students with disabilities initiating school counselors into e-learning technologies the role of government in virtual schools Web-based schools in California, Virginia, Pennsylvania, Vermont, and Texas a 13-category classification system for online educational resources the ATLAS model for program implementation evaluations of more than 1,000 pieces of online information (articles, research, reports, news, and statistics) and 900 Web applications (tutorials, drills, games, and tests) with evaluation criteria Web-Based Learning in K-12 Classrooms is a vital resource for educators interested in online learning applications across the K-12 curriculum.
Digital editing gives editors far greater freedom than ever before to move scenes of information around and place them anywhere in a film's sequence. Apple's Final Cut Pro is the most widely used Mac-based digital editor, and is especially popular with independent filmmakers and graphic artists. Final Cut Pro 5 Editing Essentials enables readers to master the craft of digital editing on Apple's Final Cut Pro. This full-color editing workshop features eight tutorials that provide firsthand experience with the art and technique of editing. Covering the essentials - capturing material, organizing it, editing, adding transitions, basic titling and sound techniques, and outputting from the application - the tutorials are explained in jargon-free language by a seasoned teacher and digital editor. This book includes downloadable resources filled with graphic files for the tutorial projects to help users hone their editing craft. Companion files are available at http://www.taylorandfrancis.com/cw/wolsky-9781578202867/.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics. |
You may like...
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
DAMA-DMBOK - Data Management Body of…
DAMA International
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Managing AI Wisely - From Development to…
Lauren Waardenburg, Marleen Huysman, …
Hardcover
R2,416
Discovery Miles 24 160
|