|
|
Books > Computing & IT
 |
Excel for beginners
- Learn Excel 2016, Including an Introduction to Formulas, Functions, Graphs, Charts, Macros, Modelling, Pivot Tables, Dashboards, Reports, Statistics, Excel Power Query, and More
(Hardcover)
Greg Shields
|
R655
R584
Discovery Miles 5 840
Save R71 (11%)
|
Ships in 18 - 22 working days
|
|
|
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
The Internet serves as an essential tool in promoting health
awareness through the circulation of important research among the
medical professional community. While digital tools and
technologies have greatly improved healthcare, challenges are still
prevalent among diverse populations worldwide. The Handbook of
Research on Advancing Health Education through Technology presents
a comprehensive discussion of health knowledge equity and the
importance of the digital age in providing life-saving data for
diagnosis and treatment of diverse populations with limited
resources. Featuring timely, research-based chapters across a broad
spectrum of topic areas including, but not limited to, online
health information resources, data management and analysis, and
knowledge accessibility, this publication is an essential reference
source for researchers, academicians, medical professionals, and
upper level students interested in the advancement and
dissemination of medical knowledge.
In recent decades, the industrial revolution has increased economic
growth despite its immersion in global environmental issues such as
climate change. Researchers emphasize the adoption of circular
economy practices in global supply chains and businesses for better
socio-environmental sustainability without compromising economic
growth. Integrating blockchain technology into business practices
could promote the circular economy as well as global environmental
sustainability. Integrating Blockchain Technology Into the Circular
Economy discusses the technological advancements in circular
economy practices, which provide better results for both economic
growth and environmental sustainability. It provides relevant
theoretical frameworks and the latest empirical research findings
in the applications of blockchain technology. Covering topics such
as big data analytics, financial market infrastructure, and
sustainable performance, this book is an essential resource for
managers, operations managers, executives, manufacturers,
environmentalists, researchers, industry practitioners, students
and educators of higher education, and academicians.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
The development of software has expanded substantially in recent
years. As these technologies continue to advance, well-known
organizations have begun implementing these programs into the ways
they conduct business. These large companies play a vital role in
the economic environment, so understanding the software that they
utilize is pertinent in many aspects. Researching and analyzing the
tools that these corporations use will assist in the practice of
software engineering and give other organizations an outline of how
to successfully implement their own computational methods. Tools
and Techniques for Software Development in Large Organizations:
Emerging Research and Opportunities is an essential reference
source that discusses advanced software methods that prominent
companies have adopted to develop high quality products. This book
will examine the various devices that organizations such as Google,
Cisco, and Facebook have implemented into their production and
development processes. Featuring research on topics such as
database management, quality assurance, and machine learning, this
book is ideally designed for software engineers, data scientists,
developers, programmers, professors, researchers, and students
seeking coverage on the advancement of software devices in today's
major corporations.
The significance of big data can be observed in any decision-making
process as it is often used for forecasting and predictive
analytics. Additionally, big data can be used to build a holistic
view of an enterprise through a collection and analysis of large
data sets retrospectively. As the data deluge deepens, new methods
for analyzing, comprehending, and making use of big data become
necessary. Enterprise Big Data Engineering, Analytics, and
Management presents novel methodologies and practical approaches to
engineering, managing, and analyzing large-scale data sets with a
focus on enterprise applications and implementation. Featuring
essential big data concepts including data mining, artificial
intelligence, and information extraction, this publication provides
a platform for retargeting the current research available in the
field. Data analysts, IT professionals, researchers, and
graduate-level students will find the timely research presented in
this publication essential to furthering their knowledge in the
field.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Wireless Public Safety Networks, Volume Two: A Systematic Approach
presents the latest advances in the wireless Public Safety Networks
(PSNs) field, the networks established by authorities to either
prepare the population for an eminent catastrophe, or those used
for support during crisis and normalization phases. Maintaining
communication capabilities in a disaster scenario is crucial for
avoiding loss of lives and damages to property. This book examines
past communication failures that have directly contributed to the
loss of lives, giving readers in-depth discussions of the public
networks that impact emergency management, covering social media,
crowdsourcing techniques, wearable wireless sensors, moving-cells
scenarios, mobility management protocols, 5G networks, broadband
networks, data dissemination, and the resources of the frequency
spectrum.
Quantum Inspired Computational Intelligence: Research and
Applications explores the latest quantum computational intelligence
approaches, initiatives, and applications in computing,
engineering, science, and business. The book explores this emerging
field of research that applies principles of quantum mechanics to
develop more efficient and robust intelligent systems. Conventional
computational intelligence-or soft computing-is conjoined with
quantum computing to achieve this objective. The models covered can
be applied to any endeavor which handles complex and meaningful
information.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|