|
Books > Computing & IT
With new technologies, such as computer vision, internet of things,
mobile computing, e-governance and e-commerce, and wide
applications of social media, organizations generate a huge volume
of data and at a much faster rate than several years ago. Big data
in large-/small-scale systems, characterized by high volume,
diversity, and velocity, increasingly drives decision making and is
changing the landscape of business intelligence. From governments
to private organizations, from communities to individuals, all
areas are being affected by this shift. There is a high demand for
big data analytics that offer insights for computing efficiency,
knowledge discovery, problem solving, and event prediction. To
handle this demand and this increase in big data, there needs to be
research on innovative and optimized machine learning algorithms in
both large- and small-scale systems. Applications of Big Data in
Large- and Small-Scale Systems includes state-of-the-art research
findings on the latest development, up-to-date issues, and
challenges in the field of big data and presents the latest
innovative and intelligent applications related to big data. This
book encompasses big data in various multidisciplinary fields from
the medical field to agriculture, business research, and smart
cities. While highlighting topics including machine learning, cloud
computing, data visualization, and more, this book is a valuable
reference tool for computer scientists, data scientists and
analysts, engineers, practitioners, stakeholders, researchers,
academicians, and students interested in the versatile and
innovative use of big data in both large-scale and small-scale
systems.
As technology continues to advance in today's global market,
practitioners are targeting systems with significant levels of
applicability and variance. Instrumentation is a multidisciplinary
subject that provides a wide range of usage in several professional
fields, specifically engineering. Instrumentation plays a key role
in numerous daily processes and has seen substantial advancement in
recent years. It is of utmost importance for engineering
professionals to understand the modern developments of instruments
and how they affect everyday life. Advancements in Instrumentation
and Control in Applied System Applications is a collection of
innovative research on the methods and implementations of
instrumentation in real-world practices including communication,
transportation, and biomedical systems. While highlighting topics
including smart sensor design, medical image processing, and atrial
fibrillation, this book is ideally designed for researchers,
software engineers, technologists, developers, scientists,
designers, IT professionals, academicians, and post-graduate
students seeking current research on recent developments within
instrumentation systems and their applicability in daily life.
The only official, comprehensive reference guide to the CISSP
Thoroughly updated for 2021 and beyond, this is the authoritative
common body of knowledge (CBK) from (ISC)2 for information security
professionals charged with designing, engineering, implementing,
and managing the overall information security program to protect
organizations from increasingly sophisticated attacks. Vendor
neutral and backed by (ISC)2, the CISSP credential meets the
stringent requirements of ISO/IEC Standard 17024. This CBK covers
the current eight domains of CISSP with the necessary depth to
apply them to the daily practice of information security. Revised
and updated by a team of subject matter experts, this comprehensive
reference covers all of the more than 300 CISSP objectives and
sub-objectives in a structured format with: Common and good
practices for each objective Common vocabulary and definitions
References to widely accepted computing standards Highlights of
successful approaches through case studies Whether you've earned
your CISSP credential or are looking for a valuable resource to
help advance your security career, this comprehensive guide offers
everything you need to apply the knowledge of the most recognized
body of influence in information security.
Big data generates around us constantly from daily business, custom
use, engineering, and science activities. Sensory data is collected
from the internet of things (IoT) and cyber-physical systems (CPS).
Merely storing such a massive amount of data is meaningless, as the
key point is to identify, locate, and extract valuable knowledge
from big data to forecast and support services. Such extracted
valuable knowledge is usually referred to as smart data. It is
vital to providing suitable decisions in business, science, and
engineering applications. Deep Learning Applications for
Cyber-Physical Systems provides researchers a platform to present
state-of-the-art innovations, research, and designs while
implementing methodological and algorithmic solutions to data
processing problems and designing and analyzing evolving trends in
health informatics and computer-aided diagnosis in deep learning
techniques in context with cyber physical systems. Covering topics
such as smart medical systems, intrusion detection systems, and
predictive analytics, this text is essential for computer
scientists, engineers, practitioners, researchers, students, and
academicians, especially those interested in the areas of internet
of things, machine learning, deep learning, and cyber-physical
systems.
Edge computing and analytics are fascinating the whole world of
computing. Industry and business are keenly embracing this sound
concept to develop customer-centric solutions by enhancing their
operations, offerings, and outputs. There is a bevy of advancements
in this domain that came with the arrival of IoT devices. The
seamless convergence of microservices and serverless computing
creates vast opportunities. With the help of IoT devices and these
other developments, there has become a deep interest in business
automation and additional improvisations in edge computing. With
the steady growth of edge devices and applications of IoT fog/edge
computing and analytics, there are also distinct challenges and
threats. Research has been keenly focused on identifying and
understanding these issues and shortcomings to bring viable
solution approaches and algorithms. Cases on Edge Computing and
Analytics describes the latest innovations, improvements, and
transformations happening with edge devices and computing. It
addresses the key concerns of the edge computing paradigm, how they
are processed, and the various technologies and tools empowering
edge computing and analytics. While highlighting topics within edge
computing such as the key drivers for implementation, computing
capabilities, security considerations, and use-cases, this book is
ideal for IT industry professionals and project managers, computer
scientists, computer engineers, and practitioners, stakeholders,
researchers, academicians, and students looking for research on the
latest trends and transitions in edge computing.
Distributed systems intertwine with our everyday lives. The
benefits and current shortcomings of the underpinning technologies
are experienced by a wide range of people and their smart devices.
With the rise of large-scale IoT and similar distributed systems,
cloud bursting technologies, and partial outsourcing solutions,
private entities are encouraged to increase their efficiency and
offer unparalleled availability and reliability to their users.
Applying Integration Techniques and Methods in Distributed Systems
is a critical scholarly publication that defines the current state
of distributed systems, determines further goals, and presents
architectures and service frameworks to achieve highly integrated
distributed systems and presents solutions to integration and
efficient management challenges faced by current and future
distributed systems. Highlighting topics such as multimedia,
programming languages, and smart environments, this book is ideal
for system administrators, integrators, designers, developers,
researchers, and academicians.
Artificial intelligence has been utilized in a diverse range of
industries as more people and businesses discover its many uses and
applications. A current field of study that requires more
attention, as there is much opportunity for improvement, is the use
of artificial intelligence within literary works and social media
analysis. Artificial Intelligence Applications in Literary Works
and Social Media presents contemporary developments in the adoption
of artificial intelligence in textual analysis of literary works
and social media and introduces current approaches, techniques, and
practices in data science that are implemented to scrap and analyze
text data. This book initiates a new multidisciplinary field that
is the combination of artificial intelligence, data science, social
science, literature, and social media study. Covering key topics
such as opinion mining, sentiment analysis, and machine learning,
this reference work is ideal for computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Making Sense of Microsoft Excel provides students with the
knowledge, tools, and skillsets they need to fully understand the
vast capabilities of Microsoft Excel, learn how the program
functions, and apply their newfound knowledge to use the program
effectively. The book begins by defining a spreadsheet, explaining
the types of information that are input into one, and the maximum
capacity of spreadsheets. Over the course of eight chapters,
students learn how to create a spreadsheet, make a graph of the
data from the sheet, use a spreadsheet to find stats about given
numbers, use the monthly payment and present value functions, name
cells, and create borders. Additional chapters address cell
indentation, protecting spreadsheets, managing lists, creating
templates, using pivot tables, using Visual Basic Programming
within a spreadsheet, and more. For the second edition, images
throughout the text have been replaced and updated to reflect the
current appearance of Microsoft programs and interfaces. Since
Microsoft programs are now a subscription-based service, the
interface of the program may continue to change; however, the
instructions in this book are up-to-date, even if coloration and
design elements differ slightly. This highly valuable and
comprehensive introduction to Microsoft Excel empowers students to
use the program confidently and effectively. Making Sense of
Microsoft Excel is well suited for courses in business, statistics,
economics, finance, or any other course that introduces the use of
Microsoft Excel.
Artificial intelligence (AI) describes machines/computers that
mimic cognitive functions that humans associate with other human
minds, such as learning and problem solving. As businesses have
evolved to include more automation of processes, it has become more
vital to understand AI and its various applications. Additionally,
it is important for workers in the marketing industry to understand
how to coincide with and utilize these techniques to enhance and
make their work more efficient. The Handbook of Research on Applied
AI for International Business and Marketing Applications is a
critical scholarly publication that provides comprehensive research
on artificial intelligence applications within the context of
international business. Highlighting a wide range of topics such as
diversification, risk management, and artificial intelligence, this
book is ideal for marketers, business professionals, academicians,
practitioners, researchers, and students.
Explore everything you need to know to set up secure remote access,
harden your firewall deployment, and protect against phishing Key
Features Learn the ins and outs of log forwarding and
troubleshooting issues Set up GlobalProtect satellite connections,
configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an
in-depth understanding of user credential detection to prevent data
leaks Book DescriptionThis book builds on the content found in
Mastering Palo Alto Networks, focusing on the different methods of
establishing remote connectivity, automating log actions, and
protecting against phishing attacks through user credential
detection. Complete with step-by-step instructions, practical
examples, and troubleshooting tips, you will gain a solid
understanding of how to configure and deploy Palo Alto Networks
remote access products. As you advance, you will learn how to
design, deploy, and troubleshoot large-scale end-to-end user VPNs.
Later, you will explore new features and discover how to
incorporate them into your environment. By the end of this Palo
Alto Networks book, you will have mastered the skills needed to
design and configure SASE-compliant remote connectivity and prevent
credential theft with credential detection. What you will learn
Understand how log forwarding is configured on the firewall Focus
on effectively enabling remote access Explore alternative ways for
connecting users and remote networks Protect against phishing with
credential detection Understand how to troubleshoot complex issues
confidently Strengthen the security posture of your firewalls Who
this book is forThis book is for anyone who wants to learn more
about remote access for users and remote locations by using
GlobalProtect and Prisma access and by deploying Large Scale VPN.
Basic knowledge of Palo Alto Networks, network protocols, and
network design will be helpful, which is why reading Mastering Palo
Alto Networks is recommended first to help you make the most of
this book.
Harden your business against internal and external cybersecurity
threats with a single accessible resource. In 8 Steps to Better
Security: A Simple Cyber Resilience Guide for Business,
cybersecurity researcher and writer Kim Crawley delivers a grounded
and practical roadmap to cyber resilience in any organization.
Offering you the lessons she learned while working for major tech
companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and
Venafi, Crawley condenses the essence of business cybersecurity
into eight steps. Written to be accessible to non-technical
businesspeople as well as security professionals, and with insights
from other security industry leaders, this important book will walk
you through how to: Foster a strong security culture that extends
from the custodial team to the C-suite Build an effective security
team, regardless of the size or nature of your business Comply with
regulatory requirements, including general data privacy rules and
industry-specific legislation Test your cybersecurity, including
third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople,
and managers at any level, 8 Steps to Better Security is also a
must-have resource for companies of all sizes, and in all
industries.
Medical and information communication technology professionals are
working to develop robust classification techniques, especially in
healthcare data/image analysis, to ensure quick diagnoses and
treatments to patients. Without fast and immediate access to
healthcare databases and information, medical professionals'
success rates and treatment options become limited and fall to
disastrous levels. Advanced Classification Techniques for
Healthcare Analysis provides emerging insight into classification
techniques in delivering quality, accurate, and affordable
healthcare, while also discussing the impact health data has on
medical treatments. Featuring coverage on a broad range of topics
such as early diagnosis, brain-computer interface, metaheuristic
algorithms, clustering techniques, learning schemes, and mobile
telemedicine, this book is ideal for medical professionals,
healthcare administrators, engineers, researchers, academicians,
and technology developers seeking current research on furthering
information and communication technology that improves patient
care.
Nowadays it is impossible to imagine a business without technology
as most industries are becoming ""smarter"" and more tech-driven,
ranging from small individual tech initiatives to complete business
models with intertwined supply chains and ""platform""-based
business models. New ways of working, such as agile and DevOps,
have been introduced, leading to new risks. These risks come in the
form of new challenges for teams working together in a distributed
manner, privacy concerns, human autonomy, and cybersecurity
concerns. Technology is now integrated into the business discipline
and is here to stay leading to the need for a thorough
understanding of how to address these risks and all the potential
problems that could arise. With the advent of organized crime, such
as hacks and denial-of-service attacks, all kinds of malicious
actors are infiltrating the digital society in new and unique ways.
Systems with poor design, implementation, and configurations are
easily taken advantage of. When it comes to integrating business
and technology, there needs to be approaches for assuring security
against risks that can threaten both businesses and their digital
platforms. Strategic Approaches to Digital Platform Security
Assurance offers comprehensive design science research approaches
to extensively examine risks in digital platforms and offer
pragmatic solutions to these concerns and challenges. This book
addresses significant problems when transforming an organization
embracing API-based platform models, the use of DevOps teams, and
issues in technological architectures. Each section will examine
the status quo for business technologies, the current challenges,
and core success factors and approaches that have been used. This
book is ideal for security analysts, software engineers, computer
engineers, executives, managers, IT consultants, business
professionals, researchers, academicians, and students who want to
gain insight and deeper knowledge of security in digital platforms
and gain insight into the most important success factors and
approaches utilized by businesses.
This book is the essential guide for any student undertaking a
computing/IS project, and will give you everything you need to
achieve outstanding results. Undertaking a project is a key
component of nearly all computing/information systems degree
programmes at both undergraduate and postgraduate levels. Projects
in Computing and Information Systems covers the four key aspects of
project work (planning, conducting, presenting and taking the
project further) in chronological fashion, and provides the reader
with the skills to excel.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|