0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (42)
  • R100 - R250 (2,815)
  • R250 - R500 (12,596)
  • R500+ (105,918)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT

Systems Analysis and Synthesis - Bridging Computer Science and Information Technology (Paperback): Barry Dwyer Systems Analysis and Synthesis - Bridging Computer Science and Information Technology (Paperback)
Barry Dwyer
R1,511 Discovery Miles 15 110 Ships in 10 - 15 working days

Systems Analysis and Synthesis: Bridging Computer Science and Information Technology presents several new graph-theoretical methods that relate system design to core computer science concepts, and enable correct systems to be synthesized from specifications. Based on material refined in the author's university courses, the book has immediate applicability for working system engineers or recent graduates who understand computer technology, but have the unfamiliar task of applying their knowledge to a real business problem. Starting with a comparison of synthesis and analysis, the book explains the fundamental building blocks of systems-atoms and events-and takes a graph-theoretical approach to database design to encourage a well-designed schema. The author explains how database systems work-useful both when working with a commercial database management system and when hand-crafting data structures-and how events control the way data flows through a system. Later chapters deal with system dynamics and modelling, rule-based systems, user psychology, and project management, to round out readers' ability to understand and solve business problems.

Mesh - Eine Reise Durch Die Diskrete Geometrie (English, German, Book): Beau Janzen, Konrad Polthier Mesh - Eine Reise Durch Die Diskrete Geometrie (English, German, Book)
Beau Janzen, Konrad Polthier
R188 Discovery Miles 1 880 Ships in 10 - 15 working days

MESH ist ein mathematisches Video ber vielfl chige Netzwerke und ihre Rolle in der Geometrie, der Numerik und der Computergraphik. Der unter Anwendung der neuesten Technologie vollst ndig computergenierte Film spannt einen Bogen von der antiken griechischen Mathematik zum Gebiet der heutigen geometrischen Modellierung. MESH hat zahlreiche wissenschaftliche Preise weltweit gewonnen. Die Autoren sind Konrad Polthier, ein Professor der Mathematik, und Beau Janzen, ein professioneller Filmdirektor.

Der Film ist ein ausgezeichnetes Lehrmittel f r Kurse in Geometrie, Visualisierung, wissenschaftlichem Rechnen und geometrischer Modellierung an Universit ten, Zentren f r wissenschaftliches Rechnen, kann jedoch auch an Schulen genutzt werden.

Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics (Hardcover): Bhushan... Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics (Hardcover)
Bhushan Patil, Manisha Vohra
R9,481 Discovery Miles 94 810 Ships in 18 - 22 working days

Analyzing data sets has continued to be an invaluable application for numerous industries. By combining different algorithms, technologies, and systems used to extract information from data and solve complex problems, various sectors have reached new heights and have changed our world for the better. The Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics is a collection of innovative research on the methods and applications of data analytics. While highlighting topics including artificial intelligence, data security, and information systems, this book is ideally designed for researchers, data analysts, data scientists, healthcare administrators, executives, managers, engineers, IT consultants, academicians, and students interested in the potential of data application technologies.

Modern Cryptography - Current Challenges and Solutions (Hardcover): Menachem Domb Modern Cryptography - Current Challenges and Solutions (Hardcover)
Menachem Domb
R3,059 Discovery Miles 30 590 Ships in 18 - 22 working days
Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science (Hardcover): Pethuru Raj, Anupama Raman Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science (Hardcover)
Pethuru Raj, Anupama Raman
R6,116 Discovery Miles 61 160 Ships in 18 - 22 working days

Fog computing is quickly increasing its applications and uses to the next level. As it continues to grow, different types of virtualization technologies can thrust this branch of computing further into mainstream use. The Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science is a key reference volume on the latest research on the role of next-generation systems and devices that are capable of self-learning and how those devices will impact society. Featuring wide-ranging coverage across a variety of relevant views and themes such as cognitive analytics, data mining algorithms, and the internet of things, this publication is ideally designed for programmers, IT professionals, students, researchers, and engineers looking for innovative research on software-defined cloud infrastructures and domain-specific analytics.

Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, VOL 4 (Hardcover): Information Reso... Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, VOL 4 (Hardcover)
Information Reso Management Association
R9,802 Discovery Miles 98 020 Ships in 18 - 22 working days
Virtual and Augmented Reality - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover): Management Association... Virtual and Augmented Reality - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover)
Management Association Information Reso Management Association
R9,435 Discovery Miles 94 350 Ships in 18 - 22 working days
Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback): Vasileios Karyotis, M. H. R.... Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback)
Vasileios Karyotis, M. H. R. Khouzani
R2,293 R2,171 Discovery Miles 21 710 Save R122 (5%) Ships in 10 - 15 working days

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Securing the Network (Hardcover): Nathan Gregory Securing the Network (Hardcover)
Nathan Gregory
R1,079 Discovery Miles 10 790 Ships in 18 - 22 working days

From the chaos of the early DARPA, ARPANET and NSF-funded NSFNET has emerged a globe-spanning communications facility we today call simply "The Internet." It has become so commonplace and so taken for granted that Wired News has decreed that writers should no longer capitalize it. This tale is not singularly focused on the past. It tells not only how we got here, but where we think the Commercial Internet must go. For all its greatness, today's Internet has serious shortcomings. Theft of personal data, identity theft, online scams, and advertising fraud run rampant, with online dollars diverted to organized crime. Insecure systems, poor security practices and an attitude of secrecy and reluctance to acknowledge failings inhibit real solutions. We propose a way forward, a networking future that is bright, optimistic, and secure.

Bioinformatics: Advanced Topics (Hardcover): Gretchen Kenney Bioinformatics: Advanced Topics (Hardcover)
Gretchen Kenney
R1,889 R1,742 Discovery Miles 17 420 Save R147 (8%) Ships in 18 - 22 working days
Advances in Human and Machine Navigation Systems (Hardcover): Rastislav Roka Advances in Human and Machine Navigation Systems (Hardcover)
Rastislav Roka
R2,556 Discovery Miles 25 560 Ships in 18 - 22 working days
Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Fundamentals of Machine Learning (Hardcover): Percy Vaughn Fundamentals of Machine Learning (Hardcover)
Percy Vaughn
R3,203 R2,901 Discovery Miles 29 010 Save R302 (9%) Ships in 18 - 22 working days
Big Data on Real-World Applications (Hardcover): Sebastian Ventura Soto, José Luna, Alberto Cano Big Data on Real-World Applications (Hardcover)
Sebastian Ventura Soto, José Luna, Alberto Cano
R3,077 Discovery Miles 30 770 Ships in 18 - 22 working days
Repetitive Project Scheduling: Theory and Methods (Paperback): Li-Hui Zhang Repetitive Project Scheduling: Theory and Methods (Paperback)
Li-Hui Zhang
R1,116 Discovery Miles 11 160 Ships in 10 - 15 working days

Repetitive Project Scheduling: Theory and Methods is the first book to comprehensively, and systematically, review new methods for scheduling repetitive projects that have been developed in response to the weaknesses of the most popular method for project scheduling, the Critical Path Method (CPM). As projects with significant levels of repetitive scheduling are common in construction and engineering, especially construction of buildings with multiple stories, highways, tunnels, pipelines, power distribution networks, and so on, the book fills a much needed gap, introducing the main repetitive project scheduling methods, both comprehensively and systematically. Users will find valuable information on core methodologies, including how to identify the controlling path and controlling segment, how to convert RSM to a network model, and examples based on practical scheduling problems.

Applying Data Science and Learning Analytics Throughout a Learner's Lifespan (Hardcover): Goran Trajkovski, Marylee... Applying Data Science and Learning Analytics Throughout a Learner's Lifespan (Hardcover)
Goran Trajkovski, Marylee Demeter, Heather Hayes
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Research in the domains of learning analytics and educational data mining has prototyped an approach where methodologies from data science and machine learning are used to gain insights into the learning process by using large amounts of data. As many training and academic institutions are maturing in their data-driven decision making, useful, scalable, and interesting trends are emerging. Organizations can benefit from sharing information on those efforts. Applying Data Science and Learning Analytics Throughout a Learner's Lifespan examines novel and emerging applications of data science and sister disciplines for gaining insights from data to inform interventions into learners' journeys and interactions with academic institutions. Data is collected at various times and places throughout a learner's lifecycle, and the learners and the institution should benefit from the insights and knowledge gained from this data. Covering topics such as learning analytics dashboards, text network analysis, and employment recruitment, this book is an indispensable resource for educators, computer scientists, faculty of higher education, government officials, educational administration, students of higher education, pre-service teachers, business professionals, researchers, and academicians.

Handbook of Research on User Experience in Web 2.0 Technologies and Its Impact on Universities and Businesses (Hardcover):... Handbook of Research on User Experience in Web 2.0 Technologies and Its Impact on Universities and Businesses (Hardcover)
Jean-Eric Pelet
R7,962 Discovery Miles 79 620 Ships in 18 - 22 working days

As various areas of discipline continue to progress into the digital age, diverse modes of technology are being experimented with and ultimately implemented into common practices. Mobile products and interactive devices, specifically, are being tested within educational environments as well as corporate business in support of online learning and e-commerce initiatives. There is a boundless stock of factors that play a role in successfully implementing web technologies and user-driven learning strategies, which require substantial research for executives and administrators in these fields. Handbook of Research on User Experience in Web 2.0 Technologies and Its Impact on Universities and Businesses is an essential reference source that presents research on the strategic role of user experience in e-learning and e-commerce at the level of the global economy, networks and organizations, teams and work groups, and information systems. The book assesses the impact of e-learning and e-commerce technologies on different organizations, including higher education institutions, multinational corporations, health providers, and business companies. Featuring research on topics such as ubiquitous interfaces, computer graphics, and image processing, this book is ideally designed for program developers and designers, researchers, practitioners, IT professionals, executives, academicians, and students.

Leveraging AI Technologies for Preventing and Detecting Sudden Cardiac Arrest and Death (Hardcover): Pradeep Nijalingappa,... Leveraging AI Technologies for Preventing and Detecting Sudden Cardiac Arrest and Death (Hardcover)
Pradeep Nijalingappa, Sandeep Kautish
R10,528 Discovery Miles 105 280 Ships in 18 - 22 working days

Sudden Cardiac Death (SCD) is a sudden, unexpected death caused by loss of heart function (sudden cardiac arrest) and Sudden Cardiac Arrest (SCA) occurs when the electrical system to the heart malfunctions and suddenly becomes very irregular. Death can often be a result if not handled quick enough or effectively. New technologies seek to help with this issue. Data processing is a crucial step to developing prognostic models. Some of the challenges in data processing are non-linear prediction models, a large number of patients and numerous predictors with complicated correlations. In traditional hypothesis-driven statistical analysis it is difficult to overcome these challenges. Current approaches to predict cardiovascular risk fail to identify many people who would benefit from preventive treatment, while others receive unnecessary intervention. So, there is an emergent need of an adaptation of AI technologies such as Machine Learning and Deep Learning Techniques to overcome the challenges. The Machine Learning (ML) approaches have great potential in increasing the accuracy of cardiovascular risk prediction and to avoid unnecessary treatment. The application of ML techniques may have the potential to improve Heart Failure outcomes and management, including cost savings by improving existing diagnostic and treatment support systems. Moreover, ML algorithms can also be applied to predict SCD. Also, Machine Learning offers an opportunity to improve accuracy by exploiting complex interactions between risk factors. The book addresses the impact and power of technology driven approaches for prevention and detection of SCA and SCD. It will provide insights on causes and symptoms of SCA and SCD and evaluate whether AI Technologies can improve the accuracy of cardiovascular risk prediction. It will explore the current issues and future technology driven solutions for SCA and SCD prevention and detection.

Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover)
Information R Management Association
R13,760 Discovery Miles 137 600 Ships in 18 - 22 working days
AWS X-Ray Developer Guide (Hardcover): Development Team AWS X-Ray Developer Guide (Hardcover)
Development Team
R1,190 Discovery Miles 11 900 Ships in 18 - 22 working days
Social Media in Higher Education - Case Studies, Reflections and Analysis (Hardcover, Hardback ed.): Chris Rowell Social Media in Higher Education - Case Studies, Reflections and Analysis (Hardcover, Hardback ed.)
Chris Rowell
R1,320 Discovery Miles 13 200 Ships in 10 - 15 working days
Advanced Digital Signal Processing: From Concepts to Applications (Hardcover): Edmond Thor Advanced Digital Signal Processing: From Concepts to Applications (Hardcover)
Edmond Thor
R3,065 R2,780 Discovery Miles 27 800 Save R285 (9%) Ships in 18 - 22 working days
A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

The Emerald Handbook of Computer-Mediated Communication and Social Media (Hardcover): Jeremy Harris Lipschultz, Karen Freberg,... The Emerald Handbook of Computer-Mediated Communication and Social Media (Hardcover)
Jeremy Harris Lipschultz, Karen Freberg, Regina Luttrell
R5,813 Discovery Miles 58 130 Ships in 18 - 22 working days

Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication (CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is new, relevant, and cutting edge in the areas of CMC and social media, authors critically explore topics ranging from social media theories to civil rights. Divided into three parts, the handbook begins with theory and methods, which sets the foundation for the text and then moves into the applicability of strategy, tactics, and measurement. The final focus is toward the future of CMC and social media and its impact on the study and practice of communication. Uniquely relating social media communication research to its computer-mediated communication foundation, as well as digital and emerging media trends, this handbook is an indispensable resource whether you're a graduate student or a seasoned practitioner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Structures and Abstractions with…
Timothy Henry, Frank Carrano Paperback R2,394 Discovery Miles 23 940
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano Paperback R2,280 Discovery Miles 22 800
Object-Oriented Discrete-Event…
Jose M. Garrido Hardcover R4,156 Discovery Miles 41 560
Introduction to Programming with C…
Y Liang Paperback R2,035 R1,643 Discovery Miles 16 430
Essential Visual Basic 5.0 Fast…
John Cowell Paperback R1,395 Discovery Miles 13 950
Objects and Systems - Principled Design…
Bernard P. Zeigler Hardcover R1,604 Discovery Miles 16 040
Concurrent Object-Oriented Programming…
Gul A. Agha, Fiorella De Cindio, … Paperback R2,877 Discovery Miles 28 770
Object-Oriented Simulation…
GW Zobrist Hardcover R4,810 Discovery Miles 48 100
Formal Methods for Open Object-based…
Howard Bowman, John Derrick Hardcover R5,403 Discovery Miles 54 030
Object-Oriented Programming A Unified…
Giuseppe Castagna Hardcover R2,859 Discovery Miles 28 590

 

Partners