![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming
Data Quality: The Accuracy Dimension is about assessing the quality
of corporate data and improving its accuracy using the data
profiling method. Corporate data is increasingly important as
companies continue to find new ways to use it. Likewise, improving
the accuracy of data in information systems is fast becoming a
major goal as companies realize how much it affects their bottom
line. Data profiling is a new technology that supports and enhances
the accuracy of databases throughout major IT shops. Jack Olson
explains data profiling and shows how it fits into the larger
picture of data quality.
This is a collection of Software Diagnostics Services webinar transcripts about pattern-oriented software diagnostics developed by Software Diagnostics Institute. Includes 9 seminars on pattern-driven software problem solving, software narratology, pattern-driven software diagnostics, systemic software diagnostics, pattern-based software diagnostics, philosophy of software diagnostics, victimware, malware narratives and pattern-oriented network trace analysis.
Software is infested with security flaws that can be misused by hackers. Current test automation does not cover negative or crash testing of software, and security experts are relying on penetration tests that focus on finding old known flaws rather than new. This book approaches the problem with the mindset of a hacker and explores the method they use to find flaws in software. The aim is give you a powerful new tool to fix worm-size holes in your own design, testing and building without adding expense or time to already tight software development schedules and budgets. Fuzzing is a software testing approach where carefully designed or just randomly generated unexpected inputs are sent to software a device in order to crash it. It's the most used technique hackers use to find security bugs. The book shows how to make it a standard practice that integrates seamlessly with other development activities and goes through each phase of software development and points out where testing and auditing can tighten security. The book also identifies cases where available tools fall short and surveys other popular fuzzing tools and techniques that work better.
In recent years, the development of distributed systems, in particular the Internet, has been influenced heavily by three paradigms: peer-to-peer, autonomous agents, and service orientation. Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations establishes an understanding of autonomous peer-to-peer Web Service models and developments as well as extends growing literature on emerging technologies. This scholarly publication is an important reference for researchers and academics working in the fields of peer-to-peer computing, Web and grid services, and agent technologies.
Blockchain Technology: Platforms, Tools and Use Cases, Volume 111, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. This volume has 8 Chapters that discuss the various aspects of Blockchain technology.
Reliability is one of the fundamental criteria in engineering systems. Design and maintenance serve to support it throughout the systems life. As such, maintenance acts in parallel to production and can have a great impact on the availability and capacity of production and the quality of the products. The authors describe current and innovative methods useful to industry and society.
This book provides research on the state-of-the-art methods for data management in the fourth industrial revolution, with particular focus on cloud.based data analytics for digital manufacturing infrastructures. Innovative techniques and methods for secure, flexible and profi table cloud manufacturing will be gathered to present advanced and specialized research in the selected area.
Authored by an internationally known expert in configuration management (CM) solutions, this unique new book helps experienced professionals and novices alike see why CM is critical to the survival of their company's e-commerce and e-business development and management. Unlike other books on configuration management, this book examines CM from a "business value" perspective. You learn why your company's e-business and e-commerce - encompassing web content, web applications, back-office applications, code and data - simply will not survive or thrive without CM. CD-ROM Included Contains two PowerPoint presentations by Susan Dart: The Agony and Ecstasy of Configuration Management and Mastering E-Development.
A comprehensive, up-to-date and practical introduction to software test design. This book presents all the important test design techniques in a single place and in a consistent and easy-to-digest format. An immediately useful handbook for test engineers, developers, quality assurance professionals and requirements and systems analysts, it enables you to: choose the best test case design; find software defects in less time and with fewer resources; and develop optimal strategies that help reduce the likelihood of costly errors. It also assists you in estimating the effort, time and cost of good testing. Numerous case studies and examples of software testing techniques are included, helping you to fully understand the practical applications of these techniques. From well-established techniques such as equivalence classes, boundary value analysis, decision tables and state-transition diagrams, to new techniques like use case testing, pairwise testing and exploratory testing, the book is a usful resource for testing professionals seeking to improve their skills and a handy reference for college-level courses in software test design.
Web service technologies are constantly being recreated, continuously challenging Web service professionals and examiners. Modern Technologies in Web Services Research facilitates communication and networking among Web services and e-business researchers and engineers in a period where considerable changes are taking place in Web services technologies innovation. Modern Technologies in Web Services Research provides mathematic foundations for service oriented computing, Web services architecture and security, frameworks for building Web service applications, and dynamic invocation mechanisms for Web services among other innovative approaches.
This book focuses on the fundamentals of deep learning along with reporting on the current state-of-art research on deep learning. In addition, it provides an insight of deep neural networks in action with illustrative coding examples. Deep learning is a new area of machine learning research which has been introduced with the objective of moving ML closer to one of its original goals, i.e. artificial intelligence. Deep learning was developed as an ML approach to deal with complex input-output mappings. While traditional methods successfully solve problems where final value is a simple function of input data, deep learning techniques are able to capture composite relations between non-immediately related fields, for example between air pressure recordings and English words, millions of pixels and textual description, brand-related news and future stock prices and almost all real world problems. Deep learning is a class of nature inspired machine learning algorithms that uses a cascade of multiple layers of nonlinear processing units for feature extraction and transformation. Each successive layer uses the output from the previous layer as input. The learning may be supervised (e.g. classification) and/or unsupervised (e.g. pattern analysis) manners. These algorithms learn multiple levels of representations that correspond to different levels of abstraction by resorting to some form of gradient descent for training via backpropagation. Layers that have been used in deep learning include hidden layers of an artificial neural network and sets of propositional formulas. They may also include latent variables organized layer-wise in deep generative models such as the nodes in deep belief networks and deep boltzmann machines. Deep learning is part of state-of-the-art systems in various disciplines, particularly computer vision, automatic speech recognition (ASR) and human action recognition.
The computer graphics (CG) industry is an attractive field for undergraduate students, but employers often find that graduates of CG art programmes are not proficient. The result is that many positions are left vacant, despite large numbers of job applicants. This book investigates how student CG artists develop proficiency. The subject is important to the rapidly growing number of educators in this sector, employers of graduates, and students who intend to develop proficiency for the purpose of obtaining employment. Educators will see why teaching software-oriented knowledge to students does not lead to proficiency, but that the development of problem-solving and visualisation skills do. This book follows a narrow focus, as students develop proficiency in a cognitively challenging task known as 'NURBS modelling'. This task was chosen due to an observed relationship between students who succeeded in the task, and students who successfully obtained employment after graduation. In the study this is based on, readers will be shown that knowledge-based explanations for the development of proficiency do not adequately account for proficiency or expertise in this field, where visualisation has been observed to develop suddenly rather than over an extended period of time. This is an unusual but not unique observation. Other studies have shown rapid development of proficiency and expertise in certain professions, such as among telegraph operators, composers and chess players. Based on these observations, the book argues that threshold concepts play a key role in the development of expertise among CG artists.
Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform--with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four
dependency-breaking techniques that help you work with program
elements in isolation and make safer changes.
This book describes a variety of test generation algorithms for testing crosstalk delay faults in VLSI circuits. It introduces readers to the various crosstalk effects and describes both deterministic and simulation-based methods for testing crosstalk delay faults. The book begins with a focus on currently available crosstalk delay models, test generation algorithms for delay faults and crosstalk delay faults, before moving on to deterministic algorithms and simulation-based algorithms used to test crosstalk delay faults. Given its depth of coverage, the book will be of interest to design engineers and researchers in the field of VLSI Testing.
This book is the best way to make the leap from SQL-92 to SQL:
1999, but it is much more than just a simple bridge between the
two. The latest from celebrated SQL experts Jim Melton and Alan
Simon, "SQL: 1999" is a comprehensive, eminently practical account
of SQL's latest incarnation and a potent distillation of the
details required to put it to work. Written to accommodate both
novice and experienced SQL users, "SQL: 1999" focuses on the
language's capabilities, from the basic to the advanced, and the
way that real applications take advantage of them. Throughout, the
authors illustrate features and techniques with clear and often
entertaining references to their own custom database, which can be
downloaded from the companion Web site.
Today's work is characterized by a high degree of innovation and thus demands a thorough overview of relevant knowledge in the world and in organizations. Semantic Work Environments support the work of the user by collecting knowledge about needs and providing processed and improved knowledge to be integrated into work. ""Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications"" describes an overview of the emerging field of Semantic Work Environments by combining various research studies and underlining the similarities between different processes, issues and approaches in order to provide the reader with techniques, methods, and applications of the study.
Systems designers are asked constantly to improve end-users experiences while ensuring network stability and security and minimizing the use of resources. This trifold demand can only be met by incorporating the latest technological advances into the design, development, and maintenance of new software systems. Theoretical and Analytical Service-Focused Systems Design and Development provides solutions to these challenges. It advances the practice and understanding of contemporary theories and empirical analysis for systems engineering in a way that achieves service excellence.
|
You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, …
Paperback
(1)R751 Discovery Miles 7 510
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
R3,950
Discovery Miles 39 500
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
|