![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming
Clouds are being positioned as the next-generation consolidated, centralized, yet federated IT infrastructure for hosting all kinds of IT platforms and for deploying, maintaining, and managing a wider variety of personal, as well as professional applications and services. Handbook of Research on Cloud Infrastructures for Big Data Analytics focuses exclusively on the topic of cloud-sponsored big data analytics for creating flexible and futuristic organizations. This book helps researchers and practitioners, as well as business entrepreneurs, to make informed decisions and consider appropriate action to simplify and streamline the arduous journey towards smarter enterprises.
Videogame history is not just a history of one successful technology replacing the next. It is also a history of platforms and communities that never quite made it; that struggled to make their voices heard; that aggravated against the conventions of the day; and that never enjoyed the commercial success or recognition of their major counterparts. In Minor Platforms in Videogame History, Benjamin Nicoll argues that 'minor' videogame histories are anything but insignificant. Through an analysis of transitional, decolonial, imaginary, residual, and minor videogame platforms, Nicoll highlights moments of difference and discontinuity in videogame history. From the domestication of vector graphics in the early years of videogame consoles to the 'cloning' of Japanese computer games in South Korea in the 1980s, this book explores case studies that challenge taken-for-granted approaches to videogames, platforms, and their histories.
In a digital context, trust is a multifaceted concept, including trust in application usability, trust in information security, and trust in fellow users. Mobile technologies have compounded the impact of such considerations. Trust Management in Mobile Environments: Autonomic and Usable Models explores current advances in digital and mobile computing technologies from the user perspective, evaluating trust models and autonomic trust management. From the recent history of trust in digital environments to prospective future developments, this book serves as a potent reference source for professionals, graduate and post-graduate students, researchers, and practitioners in the field of trust management.
Dig deep and master the intricacies of the common language runtime, C#, and .NET development. Led by programming expert Jeffrey Richter, a longtime consultant to the Microsoft .NET team - you'll gain pragmatic insights for building robust, reliable, and responsive apps and components.Fully updated for .NET Framework 4.5 and Visual Studio 2012Delivers a thorough grounding in the .NET Framework architecture, runtime environment, and other key topics, including asynchronous programming and the new Windows RuntimeProvides extensive code samples in Visual C# 2012Features authoritative, pragmatic guidance on difficult development concepts such as generics and threading
In recent years, the development of distributed systems, in particular the Internet, has been influenced heavily by three paradigms: peer-to-peer, autonomous agents, and service orientation. Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations establishes an understanding of autonomous peer-to-peer Web Service models and developments as well as extends growing literature on emerging technologies. This scholarly publication is an important reference for researchers and academics working in the fields of peer-to-peer computing, Web and grid services, and agent technologies.
This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms. The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks.
Authored by an internationally known expert in configuration management (CM) solutions, this unique new book helps experienced professionals and novices alike see why CM is critical to the survival of their company's e-commerce and e-business development and management. Unlike other books on configuration management, this book examines CM from a "business value" perspective. You learn why your company's e-business and e-commerce - encompassing web content, web applications, back-office applications, code and data - simply will not survive or thrive without CM. CD-ROM Included Contains two PowerPoint presentations by Susan Dart: The Agony and Ecstasy of Configuration Management and Mastering E-Development.
Learning Maya, the world's leading 3D animation and effects
package, is a challenge, especially for those who want to master
Maya's versatile programming features in addition to its built-in
tools.
Model-Driven Domain Analysis and Software Development: Architectures and Functions displays how to effectively map and respond to the real-world challenges and purposes which software must solve. The implications can be far-reaching and apply to domains such as mechatronic, embedded and high risk systems, where failure could cost human lives. It is also important for complex business systems, wherein failures could lead to huge financial losses. This book forms an essential reference for developers and researchers by providing both cases and theories to ensure a strong and suitable domain analysis to support all other efforts when creating and applying software solutions.
Software Reliability Engineering is the classic guide to this time-saving practice for the software professional. ACM Software Engineering Notes praised it as: ."an introductory book, a reference, and an application book all compressed in a single volume.The author's experience in reliability engineering is apparent and his expertise is infused in the text." IEEE Computer noted: "Toward software you can depend on.This book illustrates the entire SRE process.An aid to systems engineers, systems architects, developers, and managers." This Second Edition is thoroughly rewritten for the latest SRE practice, enlarged 50%, and polished by thousands of practitioners. Added workshops help you apply what you learn to your project. Frequently asked questions were doubled to more than 700. The step-by-step process summary, software user manual, list of articles of SRE user experience, glossary, background sections, and exercises are all updated, enhanced, and exhaustively indexed. To see the Table of Contents and other details, click on http: //members.aol.com/JohnDMusa/book.htm
Data Quality: The Accuracy Dimension is about assessing the quality
of corporate data and improving its accuracy using the data
profiling method. Corporate data is increasingly important as
companies continue to find new ways to use it. Likewise, improving
the accuracy of data in information systems is fast becoming a
major goal as companies realize how much it affects their bottom
line. Data profiling is a new technology that supports and enhances
the accuracy of databases throughout major IT shops. Jack Olson
explains data profiling and shows how it fits into the larger
picture of data quality.
This book provides information on digital audio watermarking, its applications, and its evaluation for copyright protection of audio signals - both basic and advanced. The author covers various advanced digital audio watermarking algorithms that can be used for copyright protection of audio signals. These algorithms are implemented using hybridization of advanced signal processing transforms such as fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and another signal processing transform such as discrete cosine transform (DCT). In these algorithms, Arnold scrambling is used to enhance the security of the watermark logo. This book is divided in to three portions: basic audio watermarking and its classification, audio watermarking algorithms, and audio watermarking algorithms using advance signal transforms. The book also covers optimization based audio watermarking. Describes basic of digital audio watermarking and its applications, including evaluation parameters for digital audio watermarking algorithms; Provides audio watermarking algorithms using advanced signal transformations; Provides optimization based audio watermarking algorithms.
A concise and practical introduction to the basic principles of effective software verification and validation (V&V). This edition has been revised and includes five new chapters and five new appendices focused on management techniques to make your company's software V&V efforts more cost-effective. Managers should learn how to help their organization create more accurate estimates and schedules. Practitioners should learn fundamental software V&V practices such as the formal inspection process, configuration management, effective testing techniques, and how to use measurements to drive further process improvements.
This is a collection of Software Diagnostics Services webinar transcripts about pattern-oriented software diagnostics developed by Software Diagnostics Institute. Includes 9 seminars on pattern-driven software problem solving, software narratology, pattern-driven software diagnostics, systemic software diagnostics, pattern-based software diagnostics, philosophy of software diagnostics, victimware, malware narratives and pattern-oriented network trace analysis.
Systems designers are asked constantly to improve end-users experiences while ensuring network stability and security and minimizing the use of resources. This trifold demand can only be met by incorporating the latest technological advances into the design, development, and maintenance of new software systems. Theoretical and Analytical Service-Focused Systems Design and Development provides solutions to these challenges. It advances the practice and understanding of contemporary theories and empirical analysis for systems engineering in a way that achieves service excellence. |
You may like...
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, …
Paperback
(1)R785 Discovery Miles 7 850
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
R3,950
Discovery Miles 39 500
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R3,940
Discovery Miles 39 400
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|