![]() |
![]() |
Your cart is empty |
||
The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
Advances in Domain Adaptation Theory gives current, state-of-the-art results on transfer learning, with a particular focus placed on domain adaptation from a theoretical point-of-view. The book begins with a brief overview of the most popular concepts used to provide generalization guarantees, including sections on Vapnik-Chervonenkis (VC), Rademacher, PAC-Bayesian, Robustness and Stability based bounds. In addition, the book explains domain adaptation problem and describes the four major families of theoretical results that exist in the literature, including the Divergence based bounds. Next, PAC-Bayesian bounds are discussed, including the original PAC-Bayesian bounds for domain adaptation and their updated version. Additional sections present generalization guarantees based on the robustness and stability properties of the learning algorithm.
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
Over the last two decades, researchers are looking at imbalanced data learning as a prominent research area. Many critical real-world application areas like finance, health, network, news, online advertisement, social network media, and weather have imbalanced data, which emphasizes the research necessity for real-time implications of precise fraud/defaulter detection, rare disease/reaction prediction, network intrusion detection, fake news detection, fraud advertisement detection, cyber bullying identification, disaster events prediction, and more. Machine learning algorithms are based on the heuristic of equally-distributed balanced data and provide the biased result towards the majority data class, which is not acceptable considering imbalanced data is omnipresent in real-life scenarios and is forcing us to learn from imbalanced data for foolproof application design. Imbalanced data is multifaceted and demands a new perception using the novelty at sampling approach of data preprocessing, an active learning approach, and a cost perceptive approach to resolve data imbalance. The Handbook of Research on Data Preprocessing, Active Learning, and Cost Perceptive Approaches for Resolving Data Imbalance offers new aspects for imbalanced data learning by providing the advancements of the traditional methods, with respect to big data, through case studies and research from experts in academia, engineering, and industry. The chapters provide theoretical frameworks and the latest empirical research findings that help to improve the understanding of the impact of imbalanced data and its resolving techniques based on data preprocessing, active learning, and cost perceptive approaches. This book is ideal for data scientists, data analysts, engineers, practitioners, researchers, academicians, and students looking for more information on imbalanced data characteristics and solutions using varied approaches.
This book is the essential guide for any student undertaking a computing/IS project, and will give you everything you need to achieve outstanding results. Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and provides the reader with the skills to excel.
Big data generates around us constantly from daily business, custom use, engineering, and science activities. Sensory data is collected from the internet of things (IoT) and cyber-physical systems (CPS). Merely storing such a massive amount of data is meaningless, as the key point is to identify, locate, and extract valuable knowledge from big data to forecast and support services. Such extracted valuable knowledge is usually referred to as smart data. It is vital to providing suitable decisions in business, science, and engineering applications. Deep Learning Applications for Cyber-Physical Systems provides researchers a platform to present state-of-the-art innovations, research, and designs while implementing methodological and algorithmic solutions to data processing problems and designing and analyzing evolving trends in health informatics and computer-aided diagnosis in deep learning techniques in context with cyber physical systems. Covering topics such as smart medical systems, intrusion detection systems, and predictive analytics, this text is essential for computer scientists, engineers, practitioners, researchers, students, and academicians, especially those interested in the areas of internet of things, machine learning, deep learning, and cyber-physical systems.
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.
Digital humanities is a dynamic and emerging field that aspires to enhance traditional research and scholarship through digital media. Although countries around the world are witnessing the widespread adoption of digital humanities, only a small portion of the literature discusses its development in the Asia Pacific region. Digital Humanities and Scholarly Research Trends in the Asia-Pacific provides innovative insights into the development of digital humanities and their ability to facilitate academic exchange and preserve cultural heritage. The content covers challenges including the need to maintain digital humanities momentum in libraries and research communities, to increase international collaboration, to maintain and promote developed digital projects, to deploy and redeploy resources to support research, and to build new skillsets and new professionals in the library. It is designed for librarians, government agencies, industry professionals, academicians, and researchers.
FOCAPD-19/Proceedings of the 9th International Conference on Foundations of Computer-Aided Process Design, July 14 - 18, 2019, compiles the presentations given at the Ninth International Conference on Foundations of Computer-Aided Process Design, FOCAPD-2019. It highlights the meetings held at this event that brings together researchers, educators and practitioners to identify new challenges and opportunities for process and product design.
Advances in Imaging and Electron Physics, Volume 211, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.
A lively insider's guide to starting a successful small business selling items old and new on eBay, written with personal anecdotes, well-kept secrets, and insider tips by Adam Ginsberg, eBay's most successful private salesperson. This is the insider's guide to making money on eBay. Adam Ginsberg is the most successful seller on eBay, moving around a million dollars' worth of merchandise every month. Not only will he impart his personal secrets on how to sell on eBay -learned through years of experience - and his tips on expanding your small business using eBay as a global market, but he'll also give fun side-notes and anecdotes, keeping the book lively and making it a fun and interesting read. This book will be a must-have for all current and aspiring eBay sellers, all small-business owners, and anyone who wants to learn how to start a million-dollar company.
The edited book has been prepared through collection of precious research articles from eminent Extension scientists, which have contributed papers on Institutional arrangements for technology delivery, innovative Extension approaches, break through methodologies in Extension research, the reach and effectiveness of ICT tools in technology delivery, youth and gender inclusive extension strategies and Extension strategies for changing scenario of Agriculture. Papers in this book would definitely make an impact among Extension scientists and post graduate scholars of Extension in Agriculture, Veterinary and Fishery Sciences.The inputs that this book offers will be of much helpful to the researchers, administrators and policy makers. From the research findings of the selected research papers of this book, the Extension researchers can sharpen their future research strategies, the Extension administrators and policy makers in the Government can get to know about the impact and constraints of several institutional mechanisms of technology delivery which will facilitate them in evidence based policy making. |
![]() ![]() You may like...
Qualitative Inquiry and Research Design…
John W. Creswell, Cheryl N. Poth
Paperback
R2,692
Discovery Miles 26 920
Statistical Literacy for Clinical…
William H. Holmes, William C. Rinaman
Hardcover
R2,717
Discovery Miles 27 170
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
Fault-Tolerant Parallel Computation
Paris Christos Kanellakis, Alex Allister Shvartsman
Hardcover
R2,996
Discovery Miles 29 960
Steel - The Story of Pittsburgh's Iron…
Dale Richard Perelman
Paperback
|