|
|
Books > Computing & IT > Applications of computing
Strategists describe networking and being able to access knowledge
as the leading path to gaining a competitive advantage. ""Cultural
Implications of Knowledge Sharing, Management and Transfer:
Identifying Competitive Advantage"" gathers contributions of
scholars from multi-disciplinary fields to illustrate, compare, and
discuss models, perspectives, and approaches involved in the
distribution, administration, and transmission of knowledge across
organizations. Containing research from leading international
experts, this defining reference collection offers diverse
viewpoints and depicts possible trajectories of future development
in achieving competitive advantage.
Advances in information technologies have allowed end users to
become a fundamental element in the development and application of
computing technology and digital information.
At one time, the office was a physical place, and employees
congregated in the same location to work together on projects. The
advent of the internet and the world wide web, however, not only
made the unthinkable possible, it forever changed the way persons
view both the office and work. ""Handbook of Research on Virtual
Workplaces and the New Nature of Business Practices"" compiles
authoritative research from XX scholars from over XX countries,
covering the issues surrounding the influx of information
technology to the office environment, from choice and effective use
of technologies to necessary participants in the virtual workplace.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power,
all the tools, and all the geekery of Linux is present in Mac OS X.
Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX
platform....Now, you can master the boot process, and Macintosh
forensic software.
* Look Back Before the Flood and Forward Through the 21st Century
Threatscape Back in the day, a misunderstanding of Macintosh
security was more or less industry-wide. Neither the administrators
nor the attackers knew much about the platform. Learn from Kevin
Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from
desktops, laptops, and servers into the world of consumer
technology (iPhones, iPods, and so on), what are the implications
for the further spread of malware and other security breaches? Find
out from David Harley.
* Malware Detection and the Mac Understand why the continuing
insistence of vociferous Mac zealots that it "can't happen here" is
likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick
graphical interface, and near-bulletproof reliability, Apple's Mac
OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure
and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use
the information obtained during a WarDrive, to successfully
penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through
exploitation techniques, tricks, and features of both OS X Tiger
and Leopard, using real-world scenarios for explaining and
demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from
the bleak days of OS9. THere is now a wide array of encryption
choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the
security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
As its title suggests, this book is a selection of papers that use
English corpora to study language variation along three dimensions
- time, place and genre. In broad terms, the book aims to bridge
the gap between corpus linguistics and sociolinguistics and to
increase our knowledge of the characteristics of English language.
It includes eleven papers which address a variety of research
questions but with the commonality of a corpus-based methodology.
Some of the contributions deal with language variation in time,
either by looking into historical corpora of English or by adopting
the method known as diachronic comparable corpus linguistics, thus
illustrating how corpora can be used to illuminate either
historical or recent developments of English. Other studies
investigate variation in space by comparing different varieties of
English, including some of the "New Englishes" such as the South
Asian varieties of English. Finally, some of the papers deal with
variation in genre, by looking into the use of language for
specific purposes through the inspection of medical articles,
social reports and academic writing.
The recent rise of emerging networking technologies such as social
networks, content centric networks, Internet of Things networks,
etc, have attracted significant attention from academia as well as
industry professionals looking to utilize these technologies for
efficiency purposes. However, the allure of such networks and
resultant storage of high volumes of data leads to increased
security risks, including threats to information privacy.
Artificial Intelligence and Security Challenges in Emerging
Networks is an essential reference source that discusses
applications of artificial intelligence, machine learning, and data
mining, as well as other tools and strategies to protect networks
against security threats and solve security and privacy problems.
Featuring research on topics such as encryption, neural networks,
and system verification, this book is ideally designed for ITC
procurement managers, IT consultants, systems and network
integrators, infrastructure service providers, computer and
software engineers, startup companies, academicians, researchers,
managers, and students.
Congruences are ubiquitous in computer science, engineering,
mathematics, and related areas. Developing techniques for finding
(the number of) solutions of congruences is an important problem.
But there are many scenarios in which we are interested in only a
subset of the solutions; in other words, there are some
restrictions. What do we know about these restricted congruences,
their solutions, and applications? This book introduces the tools
that are needed when working on restricted congruences and then
systematically studies a variety of restricted congruences.
Restricted Congruences in Computing defines several types of
restricted congruence, obtains explicit formulae for the number of
their solutions using a wide range of tools and techniques, and
discusses their applications in cryptography, information security,
information theory, coding theory, string theory, quantum field
theory, parallel computing, artificial intelligence, computational
biology, discrete mathematics, number theory, and more. This is the
first book devoted to restricted congruences and their
applications. It will be of interest to graduate students and
researchers across computer science, electrical engineering, and
mathematics.
'Computer-Mediated Relationships and Trust' examines how building
trust is different for managers developing 'virtual' (i.e. computer
mediated) relationships.
Daily procedures such as scientific experiments and business
processes have the potential to create a huge amount of data every
day, hour, or even second, and this may lead to a major problem for
the future of efficient data search and retrieval as well as secure
data storage for the world's scientists, engineers, doctors,
librarians, and business managers.Design, Performance, and Analysis
of Innovative Information Retrieval examines a number of emerging
technologies that significantly contribute to modern Information
Retrieval (IR), as well as fundamental IR theories and concepts
that have been adopted into new tools or systems. This reference is
essential to researchers, educators, professionals, and students
interested in the future of IR.
Set your students on track to achieve the best grade possible with
My Revision Notes: AQA A-level Computer Science. Our clear and
concise approach to revision will help students learn, practise and
apply their skills and understanding. Coverage of key content is
combined with practical study tips and effective revision
strategies to create a guide that can be relied on to build both
knowledge and confidence. With My Revision Notes: AQA A-level
Computer Science, students can: > Consolidate knowledge with
clear, focused and relevant content coverage, based on what
examiners are looking for > Develop understanding with
self-testing - our regular 'Now test yourself,' tasks and answers
will help commit knowledge to memory > Improve technique through
exam-style practice questions, expert tips and examples of typical
mistakes to avoid > Identify key connections between topics and
subjects with our 'Learning links' focus > Plan and manage a
successful revision programme with our topic-by-topic planner, new
exam breakdown feature, user-friendly definitions throughout and
questions and answers online
In the last decade there has been a phenomenal growth in interest
in crime pattern analysis. Geographic information systems are now
widely used in urban police agencies throughout industrial nations.
With this, scholarly interest in understanding crime patterns has
grown considerably. ""Artificial Crime Analysis Systems: Using
Computer Simulations and Geographic Information Systems"" discusses
leading research on the use of computer simulation of crime
patterns to reveal hidden processes of urban crimes, taking an
interdisciplinary approach by combining criminology, computer
simulation, and geographic information systems into one
comprehensive resource.
Interactive systems in the mobile, ubiquitous, and virtual
environments are at a stage of development where designers and
developers are keen to find out more about design, use and
usability of these systems. Ubiquitous Computing: Design,
Implementation and Usability highlights the emergent usability
theories, techniques, tools and best practices in these
environments. This book shows that usable and useful systems are
able to be achieved in ways that will improve usability to enhance
user experiences. Research on the usability issues for young
children, teenagers, adults, and the elderly is presented, with
different techniques for the mobile, ubiquitous, and virtual
environments.
This is an overview of the end-to-end data cleaning process. Data
quality is one of the most important problems in data management,
since dirty data often leads to inaccurate data analytics results
and incorrect business decisions. Poor data across businesses and
the U.S. government are reported to cost trillions of dollars a
year. Multiple surveys show that dirty data is the most common
barrier faced by data scientists. Not surprisingly, developing
effective and efficient data cleaning solutions is challenging and
is rife with deep theoretical and engineering problems. This book
is about data cleaning, which is used to refer to all kinds of
tasks and activities to detect and repair errors in the data.
Rather than focus on a particular data cleaning task, this book
describes various error detection and repair methods, and attempts
to anchor these proposals with multiple taxonomies and views.
Specifically, it covers four of the most common and important data
cleaning tasks, namely, outlier detection, data transformation,
error repair (including imputing missing values), and data
deduplication. Furthermore, due to the increasing popularity and
applicability of machine learning techniques, it includes a chapter
that specifically explores how machine learning techniques are used
for data cleaning, and how data cleaning is used to improve machine
learning models. This book is intended to serve as a useful
reference for researchers and practitioners who are interested in
the area of data quality and data cleaning. It can also be used as
a textbook for a graduate course. Although we aim at covering
state-of-the-art algorithms and techniques, we recognize that data
cleaning is still an active field of research and therefore provide
future directions of research whenever appropriate.
The process of learning words and languages may seem like an
instinctual trait, inherent to nearly all humans from a young age.
However, a vast range of complex research and information exists in
detailing the complexities of the process of word learning.
Theoretical and Computational Models of Word Learning: Trends in
Psychology and Artificial Intelligence strives to combine
cross-disciplinary research into one comprehensive volume to help
readers gain a fuller understanding of the developmental processes
and influences that makeup the progression of word learning.
Blending together developmental psychology and artificial
intelligence, this publication is intended for researchers,
practitioners, and educators who are interested in language
learning and its development as well as computational models formed
from these specific areas of research.
Research and development surrounding the use of data queries is
receiving increased attention from computer scientists and data
specialists alike. Through the use of query technology, large
volumes of data in databases can be retrieved, and information
systems built based on databases can support problem solving and
decision making across industries. The Handbook of Research on
Innovative Database Query Processing Techniques focuses on the
growing topic of database query processing methods, technologies,
and applications. Aimed at providing an all-inclusive reference
source of technologies and practices in advanced database query
systems, this book investigates various techniques, including
database and XML queries, spatiotemporal data queries, big data
queries, metadata queries, and applications of database query
systems. This comprehensive handbook is a necessary resource for
students, IT professionals, data analysts, and academicians
interested in uncovering the latest methods for using queries as a
means to extract information from databases. This all-inclusive
handbook includes the latest research on topics pertaining to
information retrieval, data extraction, data management, design and
development of database queries, and database and XM queries.
The Easy Introduction to Machine Learning (Ml) for Nontechnical
People--In Business and Beyond Artificial Intelligence for Business
is your plain-English guide to Artificial Intelligence (AI) and
Machine Learning (ML): how they work, what they can and cannot do,
and how to start profiting from them. Writing for nontechnical
executives and professionals, Doug Rose demystifies AI/ML
technology with intuitive analogies and explanations honed through
years of teaching and consulting. Rose explains everything from
early "expert systems" to advanced deep learning networks. First,
Rose explains how AI and ML emerged, exploring pivotal early ideas
that continue to influence the field. Next, he deepens your
understanding of key ML concepts, showing how machines can create
strategies and learn from mistakes. Then, Rose introduces current
powerful neural networks: systems inspired by the structure and
function of the human brain. He concludes by introducing leading AI
applications, from automated customer interactions to event
prediction. Throughout, Rose stays focused on business: applying
these technologies to leverage new opportunities and solve real
problems. Compare the ways a machine can learn, and explore current
leading ML algorithms Start with the right problems, and avoid
common AI/ML project mistakes Use neural networks to automate
decision-making and identify unexpected patterns Help neural
networks learn more quickly and effectively Harness AI chatbots,
virtual assistants, virtual agents, and conversational AI
applications
The Internet of Things (IoT) has made revolutionary advances in the
utility grid as we know it. Among these advances, intelligent
medical services are gaining much interest. The use of Artificial
Intelligence (AI) is increasing day after day in fighting one of
the most significant viruses, COVID-19. The purpose of this book is
to present the detailed recent exploration of AI and IoT in the
COVID-19 pandemic and similar applications. The integrated AI and
IoT paradigm is widely used in most medical applications, as well
as in sectors that deal with transacting data every day. This book
can be used by computer science undergraduate and postgraduate
students; researchers and practitioners; and city administrators,
policy makers, and government regulators. It presents a smart and
up-to-date model for COVID-19 and similar applications. Novel
architectural and medical use cases in the smart city project are
the core aspects of this book. The wide variety of topics it
presents offers readers multiple perspectives on a variety of
disciplines. Prof. Dr. Fadi Al-Turjman received his PhD in computer
science from Queen's University, Kingston, Ontario, Canada, in
2011. He is a full professor and research center director at Near
East University, Nicosia, Cyprus.
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic
topics to provides law enforcement and IT security professionals
with the information needed to manage a digital investigation.
Everything needed for analyzing forensic data and recovering
digital evidence can be found in one place, including instructions
for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents
related to corporate espionage or other criminal activities are
learning as they go and need a comprehensive step-by-step guide to
e-discovery
* Appeals to law enforcement agencies with limited budgets
It is clear that the digital age has fully embraced music
production, distribution, and transcendence for a vivid audience
that demands more music both in quantity and versatility. However,
the evolving world of digital music production faces a calamity of
tremendous proportions: the asymmetrically increasing online piracy
that devastates radio stations, media channels, producers,
composers, and artists, severely threatening the music industry.
Digital Tools for Computer Music Production and Distribution
presents research-based perspectives and solutions for integrating
computational methods for music production, distribution, and
access around the world, in addition to challenges facing the music
industry in an age of digital access, content sharing, and crime.
Highlighting the changing scope of the music industry and the role
of the digital age in such transformations, this publication is an
essential resource for computer programmers, sound engineers,
language and speech experts, legal experts specializing in music
piracy and rights management, researchers, and graduate-level
students across disciplines.
|
You may like...
All of Grace
Charles Spurgeon
Hardcover
R529
Discovery Miles 5 290
|