0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (7)
  • R100 - R250 (347)
  • R250 - R500 (1,625)
  • R500+ (50,292)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing

Cultural Implications of Knowledge Sharing, Management and Transfer - Identifying Competitive Advantage (Hardcover): Deogratias... Cultural Implications of Knowledge Sharing, Management and Transfer - Identifying Competitive Advantage (Hardcover)
Deogratias Harorimana
R4,669 Discovery Miles 46 690 Ships in 18 - 22 working days

Strategists describe networking and being able to access knowledge as the leading path to gaining a competitive advantage. ""Cultural Implications of Knowledge Sharing, Management and Transfer: Identifying Competitive Advantage"" gathers contributions of scholars from multi-disciplinary fields to illustrate, compare, and discuss models, perspectives, and approaches involved in the distribution, administration, and transmission of knowledge across organizations. Containing research from leading international experts, this defining reference collection offers diverse viewpoints and depicts possible trajectories of future development in achieving competitive advantage.

End User Computing Challenges and Technologies - Emerging Tools and Applications (Hardcover): Steve Clarke End User Computing Challenges and Technologies - Emerging Tools and Applications (Hardcover)
Steve Clarke
R4,582 Discovery Miles 45 820 Ships in 18 - 22 working days

Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.

Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover): Hsin-Ho... Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover)
Hsin-Ho Wu
R2,057 Discovery Miles 20 570 Ships in 18 - 22 working days
Ontological Analyses in Science, Technology and Informatics (Hardcover): Andino Maseleno, Marini Othman Ontological Analyses in Science, Technology and Informatics (Hardcover)
Andino Maseleno, Marini Othman
R2,552 Discovery Miles 25 520 Ships in 18 - 22 working days
S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,042 Discovery Miles 10 420 Ships in 18 - 22 working days
Handbook of Research on Virtual Workplaces and the New Nature of Business Practices (Hardcover): Pavel Zemliansky, James Madison Handbook of Research on Virtual Workplaces and the New Nature of Business Practices (Hardcover)
Pavel Zemliansky, James Madison
R6,306 Discovery Miles 63 060 Ships in 18 - 22 working days

At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the internet and the world wide web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. ""Handbook of Research on Virtual Workplaces and the New Nature of Business Practices"" compiles authoritative research from XX scholars from over XX countries, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace.

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Artificial Neural Networks: Advances and Applications (Hardcover): John Hopkins Artificial Neural Networks: Advances and Applications (Hardcover)
John Hopkins
R3,293 R2,981 Discovery Miles 29 810 Save R312 (9%) Ships in 18 - 22 working days
English Corpus Linguistics: Variation in Time, Space and Genre - Selected papers from ICAME 32 (Hardcover): Gisle Andersen,... English Corpus Linguistics: Variation in Time, Space and Genre - Selected papers from ICAME 32 (Hardcover)
Gisle Andersen, Kristin Bech
R2,906 Discovery Miles 29 060 Ships in 18 - 22 working days

As its title suggests, this book is a selection of papers that use English corpora to study language variation along three dimensions - time, place and genre. In broad terms, the book aims to bridge the gap between corpus linguistics and sociolinguistics and to increase our knowledge of the characteristics of English language. It includes eleven papers which address a variety of research questions but with the commonality of a corpus-based methodology. Some of the contributions deal with language variation in time, either by looking into historical corpora of English or by adopting the method known as diachronic comparable corpus linguistics, thus illustrating how corpora can be used to illuminate either historical or recent developments of English. Other studies investigate variation in space by comparing different varieties of English, including some of the "New Englishes" such as the South Asian varieties of English. Finally, some of the papers deal with variation in genre, by looking into the use of language for specific purposes through the inspection of medical articles, social reports and academic writing.

Artificial Intelligence and Security Challenges in Emerging Networks (Hardcover): Ryma Abassi Artificial Intelligence and Security Challenges in Emerging Networks (Hardcover)
Ryma Abassi
R4,882 Discovery Miles 48 820 Ships in 18 - 22 working days

The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.

Restricted Congruences in Computing (Hardcover): Khodakhast Bibak Restricted Congruences in Computing (Hardcover)
Khodakhast Bibak
R1,750 Discovery Miles 17 500 Ships in 10 - 15 working days

Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.

Computer-mediated Relationships and Trust - Managerial and Organizational Effects (Hardcover): Linda L. Brennan, Victoria... Computer-mediated Relationships and Trust - Managerial and Organizational Effects (Hardcover)
Linda L. Brennan, Victoria Johnson
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

'Computer-Mediated Relationships and Trust' examines how building trust is different for managers developing 'virtual' (i.e. computer mediated) relationships.

Contemporary Perspectives in Data Mining Volume 4 (Hardcover): Kenneth D. Lawrence, Ronald K. Klimberg Contemporary Perspectives in Data Mining Volume 4 (Hardcover)
Kenneth D. Lawrence, Ronald K. Klimberg
R2,544 Discovery Miles 25 440 Ships in 18 - 22 working days
AI R&D in Asia - A snapshot of AI activities across the Asian region (Hardcover): David K. Kahaner AI R&D in Asia - A snapshot of AI activities across the Asian region (Hardcover)
David K. Kahaner; As told to Atip
R2,361 Discovery Miles 23 610 Ships in 10 - 15 working days
Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover): Joan Lu Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover)
Joan Lu
R5,005 Discovery Miles 50 050 Ships in 18 - 22 working days

Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have been adopted into new tools or systems. This reference is essential to researchers, educators, professionals, and students interested in the future of IR.

My Revision Notes: AQA A-level Computer Science (Paperback): Mark Clarkson My Revision Notes: AQA A-level Computer Science (Paperback)
Mark Clarkson
R750 Discovery Miles 7 500 Ships in 10 - 15 working days

Set your students on track to achieve the best grade possible with My Revision Notes: AQA A-level Computer Science. Our clear and concise approach to revision will help students learn, practise and apply their skills and understanding. Coverage of key content is combined with practical study tips and effective revision strategies to create a guide that can be relied on to build both knowledge and confidence. With My Revision Notes: AQA A-level Computer Science, students can: > Consolidate knowledge with clear, focused and relevant content coverage, based on what examiners are looking for > Develop understanding with self-testing - our regular 'Now test yourself,' tasks and answers will help commit knowledge to memory > Improve technique through exam-style practice questions, expert tips and examples of typical mistakes to avoid > Identify key connections between topics and subjects with our 'Learning links' focus > Plan and manage a successful revision programme with our topic-by-topic planner, new exam breakdown feature, user-friendly definitions throughout and questions and answers online

Artificial Crime Analysis Systems - Using Computer Simulations and Geographic Information Systems (Hardcover): Lin Liu, John Eck Artificial Crime Analysis Systems - Using Computer Simulations and Geographic Information Systems (Hardcover)
Lin Liu, John Eck
R4,647 Discovery Miles 46 470 Ships in 18 - 22 working days

In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably. ""Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems"" discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of urban crimes, taking an interdisciplinary approach by combining criminology, computer simulation, and geographic information systems into one comprehensive resource.

Ubiquitous Computing - Design, Implementation and Usability (Hardcover): Yin-Leng Theng, Henry Duh Ubiquitous Computing - Design, Implementation and Usability (Hardcover)
Yin-Leng Theng, Henry Duh
R4,600 Discovery Miles 46 000 Ships in 18 - 22 working days

Interactive systems in the mobile, ubiquitous, and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use and usability of these systems. Ubiquitous Computing: Design, Implementation and Usability highlights the emergent usability theories, techniques, tools and best practices in these environments. This book shows that usable and useful systems are able to be achieved in ways that will improve usability to enhance user experiences. Research on the usability issues for young children, teenagers, adults, and the elderly is presented, with different techniques for the mobile, ubiquitous, and virtual environments.

Data Cleaning (Hardcover): Ihab F. Ilyas, Xu Chu Data Cleaning (Hardcover)
Ihab F. Ilyas, Xu Chu
R2,244 Discovery Miles 22 440 Ships in 18 - 22 working days

This is an overview of the end-to-end data cleaning process. Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, this book describes various error detection and repair methods, and attempts to anchor these proposals with multiple taxonomies and views. Specifically, it covers four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, it includes a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.

Theoretical and Computational Models of Word Learning - Trends in Psychology and Artificial Intelligence (Hardcover, New):... Theoretical and Computational Models of Word Learning - Trends in Psychology and Artificial Intelligence (Hardcover, New)
Lakshmi Gogate, George Hollich
R4,519 Discovery Miles 45 190 Ships in 18 - 22 working days

The process of learning words and languages may seem like an instinctual trait, inherent to nearly all humans from a young age. However, a vast range of complex research and information exists in detailing the complexities of the process of word learning. Theoretical and Computational Models of Word Learning: Trends in Psychology and Artificial Intelligence strives to combine cross-disciplinary research into one comprehensive volume to help readers gain a fuller understanding of the developmental processes and influences that makeup the progression of word learning. Blending together developmental psychology and artificial intelligence, this publication is intended for researchers, practitioners, and educators who are interested in language learning and its development as well as computational models formed from these specific areas of research.

Handbook of Research on Innovative Database Query Processing Techniques (Hardcover): Li Yan Handbook of Research on Innovative Database Query Processing Techniques (Hardcover)
Li Yan
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including database and XML queries, spatiotemporal data queries, big data queries, metadata queries, and applications of database query systems. This comprehensive handbook is a necessary resource for students, IT professionals, data analysts, and academicians interested in uncovering the latest methods for using queries as a means to extract information from databases. This all-inclusive handbook includes the latest research on topics pertaining to information retrieval, data extraction, data management, design and development of database queries, and database and XM queries.

Artificial Intelligence for Business (Paperback, 2nd edition): Doug Rose Artificial Intelligence for Business (Paperback, 2nd edition)
Doug Rose
R622 Discovery Miles 6 220 Ships in 10 - 15 working days

The Easy Introduction to Machine Learning (Ml) for Nontechnical People--In Business and Beyond Artificial Intelligence for Business is your plain-English guide to Artificial Intelligence (AI) and Machine Learning (ML): how they work, what they can and cannot do, and how to start profiting from them. Writing for nontechnical executives and professionals, Doug Rose demystifies AI/ML technology with intuitive analogies and explanations honed through years of teaching and consulting. Rose explains everything from early "expert systems" to advanced deep learning networks. First, Rose explains how AI and ML emerged, exploring pivotal early ideas that continue to influence the field. Next, he deepens your understanding of key ML concepts, showing how machines can create strategies and learn from mistakes. Then, Rose introduces current powerful neural networks: systems inspired by the structure and function of the human brain. He concludes by introducing leading AI applications, from automated customer interactions to event prediction. Throughout, Rose stays focused on business: applying these technologies to leverage new opportunities and solve real problems. Compare the ways a machine can learn, and explore current leading ML algorithms Start with the right problems, and avoid common AI/ML project mistakes Use neural networks to automate decision-making and identify unexpected patterns Help neural networks learn more quickly and effectively Harness AI chatbots, virtual assistants, virtual agents, and conversational AI applications

AI-Powered IoT for COVID-19 (Hardcover): Fadi Al-Turjman AI-Powered IoT for COVID-19 (Hardcover)
Fadi Al-Turjman
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

The Internet of Things (IoT) has made revolutionary advances in the utility grid as we know it. Among these advances, intelligent medical services are gaining much interest. The use of Artificial Intelligence (AI) is increasing day after day in fighting one of the most significant viruses, COVID-19. The purpose of this book is to present the detailed recent exploration of AI and IoT in the COVID-19 pandemic and similar applications. The integrated AI and IoT paradigm is widely used in most medical applications, as well as in sectors that deal with transacting data every day. This book can be used by computer science undergraduate and postgraduate students; researchers and practitioners; and city administrators, policy makers, and government regulators. It presents a smart and up-to-date model for COVID-19 and similar applications. Novel architectural and medical use cases in the smart city project are the core aspects of this book. The wide variety of topics it presents offers readers multiple perspectives on a variety of disciplines. Prof. Dr. Fadi Al-Turjman received his PhD in computer science from Queen's University, Kingston, Ontario, Canada, in 2011. He is a full professor and research center director at Near East University, Nicosia, Cyprus.

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Digital Tools for Computer Music Production and Distribution (Hardcover): Dionysios Politis, Miltiadis Tsaligopoulos, Ioannis... Digital Tools for Computer Music Production and Distribution (Hardcover)
Dionysios Politis, Miltiadis Tsaligopoulos, Ioannis Iglezakis
R4,520 Discovery Miles 45 200 Ships in 18 - 22 working days

It is clear that the digital age has fully embraced music production, distribution, and transcendence for a vivid audience that demands more music both in quantity and versatility. However, the evolving world of digital music production faces a calamity of tremendous proportions: the asymmetrically increasing online piracy that devastates radio stations, media channels, producers, composers, and artists, severely threatening the music industry. Digital Tools for Computer Music Production and Distribution presents research-based perspectives and solutions for integrating computational methods for music production, distribution, and access around the world, in addition to challenges facing the music industry in an age of digital access, content sharing, and crime. Highlighting the changing scope of the music industry and the role of the digital age in such transformations, this publication is an essential resource for computer programmers, sound engineers, language and speech experts, legal experts specializing in music piracy and rights management, researchers, and graduate-level students across disciplines.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Only Del - The Greatest Batsman in…
W G Braund Hardcover R777 Discovery Miles 7 770
Pittsburgh Pirates
David Finoli Hardcover R719 R638 Discovery Miles 6 380
Swimming - Swimming Made Easy: Beginner…
Ace McCloud Hardcover R551 R511 Discovery Miles 5 110
Introduction to Security Reduction
Fuchun Guo, Willy Susilo, … Hardcover R4,891 Discovery Miles 48 910
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Baseball in Fort Wayne
Chad Gramling Hardcover R719 R638 Discovery Miles 6 380
The Baptist Confession of Faith 1689
Various Hardcover R432 Discovery Miles 4 320
Los Angeles County Lifeguards
Arthur C Verge Hardcover R719 R638 Discovery Miles 6 380
All of Grace
Charles Spurgeon Hardcover R529 Discovery Miles 5 290
The Pointy Arrow Concept - Designing…
Hank Buntin Hardcover R498 Discovery Miles 4 980

 

Partners