![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
INCLUYE CD ROM- PRINCIPIANTE INTERMEIDO La forma inteligente de aprender Microsoft Project, paso a paso. Una forma facil y rapida de aprender por uno mismo como utilizar la gestion de los proyectos en Microsoft Project 2002. Con el "paso a paso" puede estudiar solamente aquellas lecciones que sean necesarias, o trabajar desde la primera leccion hasta la ultima. En ambos casos, sera capaz de practicar y adquirir los conocimientose en el momento que lo considere oportuno. CON ESTE LIBRO: - Desarrolle un plan de proyecto con tareas, recursos y asignaciones. - Aprenda las tecnicas para gestionar varios proyectos y dependencias. - Colabore utilizando Microsoft Project Server y Microsoft Project Access Web. - Domine las herramientas para presentar su plan y crear informes. - Lleve a cabo un seguimiento del progreso y los costes y realice ajustes en tiempo real. - Amplie ademas sus conocimientos de gestion de proyectos con el curso rapido del apendice. El libro incluye un CD-ROM con versiones de prueba de Microsoft Project 2002 Standard y Server totalmente funcionales durante 60 dias, mas los archivos de practica
An all-inclusive survey of the fundamentals of parallel and distributed computing. The use of parallel and distributed computing has increased dramatically over the past few years, giving rise to a variety of projects, implementations, and buzzwords surrounding the subject. Although the areas of parallel and distributed computing have traditionally evolved separately, these models have overlapping goals and characteristics. Parallel and Distributed Computing surveys the models and paradigms in this converging area of parallel and distributed computing and considers the diverse approaches within a common text. Covering a comprehensive set of models and paradigms, the material also skims lightly over more specific details and serves as both an introduction and a survey. Novice readers will be able to quickly grasp a balanced overview with the review of central concepts, problems, and ideas, while the more experienced researcher will appreciate the specific comparisons between models, the coherency of the parallel and distributed computing field, and the discussion of less well-known proposals. Other topics covered include:
Parallel and Distributed Computing is a perfect tool for students and can be used as a foundation for parallel and distributed computing courses. Application developers will find this book helpful to get an overview before choosing a particular programming style to study in depth, and researchers and programmers will appreciate the wealth of information concerning the various areas of parallel and distributed computing.
Features: A systematic and comprehensive understanding of the Block chain technology and the potential in Healthcare. How security and privacy concerns of healthcare data can be addressed using Blockchain Technology. Concept of smart contracts for performing advance level scripting to create a blockchain network for providing a platform for the development of decentralized applications is discussed Chapter on role of blockchain based insurance application using Ethereum/Hyperledger is included Use cases of blockchain for various aspects of drug manufacturing and pharma supply chain..
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future. Amidst the ongoing digital revolution, widespread educational reform, and the most significant global pandemic of our lifetimes, we are at a pivotal time in history. Transformative Digital Technology for Effective Workplace Learning explores the technological developments that are rapidly unfolding in the workplace and those that support workplace training. What emerges is that the rate of change and the possibilities for improvement are more extensive than many of us might have suspected. From artificial intelligence to virtual reality, from data analytics, to adaptive learning, there is the capacity for significant innovation and opportunity if harnessed in the right ways. The book offers an overview of several critical issues that face the future of the workplace and examines them through the lens of lifelong learning. The book begins by conveying the current impacts on the workplace and how the internal function of learning and development has evolved. It then considers the eight learning imperatives that drive workplace learning and then looks at the future workplace. Exploring technological frameworks for digitally enhanced workplace learning, the book takes a deep dive into the capabilities of immersive technologies, as well as into the insights enabled through learning analytics. The goal of this book is not to merely describe technological advancements in the workplace but instead, to challenge the status quo and think critically about the future that lies ahead. One aim is to have business leaders understand the necessity for ongoing workplace learning. Another is that individuals appreciate that lifelong learning is the new social norm. Ongoing education allows people to become more open to change and less anxious about new experiences. Developing a growth mindset and adopting a company culture that says everyone can learn new things and continue to improve their performance will become the standard. Most importantly, as the business world is reconfigured before our very eyes, ongoing learning must become an economic imperative.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future. Amidst the ongoing digital revolution, widespread educational reform, and the most significant global pandemic of our lifetimes, we are at a pivotal time in history. Transformative Digital Technology for Effective Workplace Learning explores the technological developments that are rapidly unfolding in the workplace and those that support workplace training. What emerges is that the rate of change and the possibilities for improvement are more extensive than many of us might have suspected. From artificial intelligence to virtual reality, from data analytics, to adaptive learning, there is the capacity for significant innovation and opportunity if harnessed in the right ways. The book offers an overview of several critical issues that face the future of the workplace and examines them through the lens of lifelong learning. The book begins by conveying the current impacts on the workplace and how the internal function of learning and development has evolved. It then considers the eight learning imperatives that drive workplace learning and then looks at the future workplace. Exploring technological frameworks for digitally enhanced workplace learning, the book takes a deep dive into the capabilities of immersive technologies, as well as into the insights enabled through learning analytics. The goal of this book is not to merely describe technological advancements in the workplace but instead, to challenge the status quo and think critically about the future that lies ahead. One aim is to have business leaders understand the necessity for ongoing workplace learning. Another is that individuals appreciate that lifelong learning is the new social norm. Ongoing education allows people to become more open to change and less anxious about new experiences. Developing a growth mindset and adopting a company culture that says everyone can learn new things and continue to improve their performance will become the standard. Most importantly, as the business world is reconfigured before our very eyes, ongoing learning must become an economic imperative.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.
If you need to learn CUDA but don't have experience with
parallel computing, "CUDA Programming: A Developer's Introduction
"offers a detailed guide to CUDA with a grounding in parallel
fundamentals. It starts by introducing CUDA and bringing you up to
speed on GPU parallelism and hardware, then delving into CUDA
installation. Chapters on core concepts including threads, blocks,
grids, and memory focus on both parallel and CUDA-specific issues.
Later, the book demonstrates CUDA in practice for optimizing
applications, adjusting to new hardware, and solving common
problems.
What telecommunications professionals need to know about nonlinear
optical communication systems
Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.
This book serves as a practical guide for practicing engineers who need to design embedded systems for high-speed data acquisition and control systems. A minimum amount of theory is presented, along with a review of analog and digital electronics, followed by detailed explanations of essential topics in hardware design and software development. The discussion of hardware focuses on microcontroller design (ARM microcontrollers and FPGAs), techniques of embedded design, high speed data acquisition (DAQ) and control systems. Coverage of software development includes main programming techniques, culminating in the study of real-time operating systems. All concepts are introduced in a manner to be highly-accessible to practicing engineers and lead to the practical implementation of an embedded board that can be used in various industrial fields as a control system and high speed data acquisition system.
Danny Greefhorst is a principal consultant and owner of ArchiXL, and works for clients in the financial and public sector. Danny acts as an IT architect and IT consultant, and is TOGAF 9 certified. He has extensive experience with the definition and implementation of enterprise architectures, application architectures and technical architectures. In addition, he coaches organizations in setting up and executing their architecture function, and is active as an instructor for several classes on architecture. Before starting ArchiXL he worked as a principal consultant at Yellowtail, as a senior IT architect at IBM Business Consulting Services and as a researcher at the Software Engineering Research Centre. Danny is active in the architecture community and regularly publishes on IT and architecture related topics. He is the chairman of the governing board of Via Nova Architectura, a portal and electronic magazine on enterprise architecture. He is also a member of the governing board of the architecture department of the Dutch Computer Science Association (Ngi). Erik (H.A.) Proper is a senior research manager at the Public Research Centre -- Henri Tudor in Luxembourg, where he leads Services-oriented Enterprise Engineering programme. He also holds a chair in Information Systems at the Radboud University Nijmegen in the Netherlands. Erik has a mixed industrial and academic background. In the past, Erik worked for companies such as Asymetrix, InfoModeller, Origin, ID Research, Ordina and Capgemini, while interleaving this with his work at research institutions such as the Radboud University of Nijmegen, Queensland University of Technology, the Distributed Systems Technology Centre, and the University of Queensland. His general research drive is the modeling of systems. He applies this drive mainly in the fields of service science, enterprise modeling, enterprise engineering and enterprise architecting. He was co-initiator of the ArchiMate project, and currently also serves on the board of the ArchiMate forum of The Open Group. Erik is also one of the editors in chief of Springer's series on enterprise engineering.
This book addresses the topic of exploiting enterprise-linked data with a particular focus on knowledge construction and accessibility within enterprises. It identifies the gaps between the requirements of enterprise knowledge consumption and "standard" data consuming technologies by analysing real-world use cases, and proposes the enterprise knowledge graph to fill such gaps. It provides concrete guidelines for effectively deploying linked-data graphs within and across business organizations. It is divided into three parts, focusing on the key technologies for constructing, understanding and employing knowledge graphs. Part 1 introduces basic background information and technologies, and presents a simple architecture to elucidate the main phases and tasks required during the lifecycle of knowledge graphs. Part 2 focuses on technical aspects; it starts with state-of-the art knowledge-graph construction approaches, and then discusses exploration and exploitation techniques as well as advanced question-answering topics concerning knowledge graphs. Lastly, Part 3 demonstrates examples of successful knowledge graph applications in the media industry, healthcare and cultural heritage, and offers conclusions and future visions.
SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
"The most interesting book ever written about Google" (The Washington Post) delivers the inside story behind the most successful and admired technology company of our time, now updated with a new Afterword. Google is arguably the most important company in the world today, with such pervasive influence that its name is a verb. The company founded by two Stanford graduate students-Larry Page and Sergey Brin-has become a tech giant known the world over. Since starting with its search engine, Google has moved into mobile phones, computer operating systems, power utilities, self-driving cars, all while remaining the most powerful company in the advertising business. Granted unprecedented access to the company, Levy disclosed that the key to Google's success in all these businesses lay in its engineering mindset and adoption of certain internet values such as speed, openness, experimentation, and risk-taking. Levy discloses details behind Google's relationship with China, including how Brin disagreed with his colleagues on the China strategy-and why its social networking initiative failed; the first time Google tried chasing a successful competitor. He examines Google's rocky relationship with government regulators, particularly in the EU, and how it has responded when employees left the company for smaller, nimbler start-ups. In the Plex is the "most authoritative...and in many ways the most entertaining" (James Gleick, The New York Book Review) account of Google to date and offers "an instructive primer on how the minds behind the world's most influential internet company function" (Richard Waters, The Wall Street Journal).
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems Nuggets of practical advice and numerous case studies throughout Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems. This book is indispensable for embedded systems and security professionals, new and experienced. An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market. Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology. Adriel Desautels, President and CTO, Netragard, LLC. Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time. Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied
Sciences; Chairman, Embedded World Conference steering board
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform
IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.
|
You may like...
The Evolutionary Cosmos - Outside-In…
Richard Westberg, Cal Orey
Hardcover
R1,032
Discovery Miles 10 320
|