Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
14th International Symposium on Process Systems Engineering, Volume 49 brings together the international community of researchers and engineers interested in computing-based methods in process engineering. The conference highlights the contributions of the PSE community towards the sustainability of modern society and is based on the 2021 event held in Tokyo, Japan, July 1-23, 2021. It contains contributions from academia and industry, establishing the core products of PSE, defining the new and changing scope of our results, and covering future challenges. Plenary and keynote lectures discuss real-world challenges (globalization, energy, environment and health) and contribute to discussions on the widening scope of PSE versus the consolidation of the core topics of PSE.
Preparing for your SAP S/4HANA business process integration exam? Make the grade with this certification study guide to C_TS410! From financial accounting to warehouse management, this guide will review the key technical and functional knowledge you need to exceed the cut score. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to C_TS410 certification begins here! In this book, you'll learn about:a. The TestGet ready for test day! This guide follows the exact structure of the exam, so align your study of SAP S/4HANA business process integration with the test objectives and walk through the topics covered in C_TS410_2020. b. Core ContentReview major subject areas like financial accounting, source-to-pay processing, and human experience management. Then master important terminology and key takeaways for each subject. c. Q&AAfter reviewing each chapter, solidify your knowledge with questions and answers for each section and improve your test-taking skills.Highlights Include: 1) Exams C_TS410_2020 2) Financial and management accounting 3) Source-to-pay processing 4) Lead-to-cash processing 5) Design-to-operate processing 6) Procurement7) Supply chain 8) Production planning 9) Enterprise asset management 10) Warehouse management 11) Project systems 12) Human experience management
Brings together a cohesive and coherent account of the dramaturgy of sound in three key contemporary performance genres. Written for contemporary performance scholars and upper level students, using case studies and clear genre delineations. Moves existing scholarship in this area forward by drawing on a wealth of supplementary material tied to its research funding, including a full dataset, interview footage and a podcast.
* Essay-based format weaves together technical details and case studies to cut through complexity * Provides a strong background in business situations that companies face, to ensure that data analytics efforts are productively directed and organized * Appropriate for both business and engineering students who need to understand the data analytics lifecycle
Sounds of the Pandemic offers one of the first critical analyses of the changes in sonic environments, artistic practice, and listening behaviour caused by the Coronavirus outbreak. This multifaceted collection provides a detailed picture of a wide array of phenomena related to sound and music, including soundscapes, music production, music performance, and mediatisation processes in the context of COVID-19. It represents a first step to understanding how the pandemic and its by-products affected sound domains in terms of experiences and practices, representations, collective imaginaries, and socio-political manipulations. This book is essential reading for students, researchers, and practitioners working in the realms of music production and performance, musicology and ethnomusicology, sound studies, and media and cultural studies.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial. Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans. Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests. The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject. This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law. New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax. Readers of the third edition of Cybersecurity Law will also find: An all-new chapter focused on laws related to ransomware and the latest attacks that compromise the availability of data and systems New and updated sections on new data security laws in New York and Alabama, President Biden's cybersecurity executive order, the Supreme Court's first opinion interpreting the Computer Fraud and Abuse Act, American Bar Association guidance on law firm cybersecurity, Internet of Things cybersecurity laws and guidance, the Cybersecurity Maturity Model Certification, the NIST Privacy Framework, and more New cases that feature the latest findings in the constantly evolving cybersecurity law space An article by the author of this textbook, assessing the major gaps in U.S. cybersecurity law A companion website for instructors that features expanded case studies, discussion questions by chapter, and exam questions by chapter Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields, as well as academic and corporate libraries that support these professions.
A two-volume set to help you prepare for success on the NEW Cisco CCNA Certification exam. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to take one exam, which will validate your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2. Understanding Cisco Networking Technologies provides comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. The CCNA Certification Study Guide prepares you for the new CCNA certification Exam 200-301, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentals Review network access concepts Solidify your knowledge related to IP connectivity and services Assess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.
The great majority of books on artificial intelligence are written by AI experts who understandably focus on its achievements and potential transformative effects on society. In contrast, AI vs Humans is written by two psychologists (Michael and Christine Eysenck) whose perspective on AI (including robotics) is based on their knowledge and understanding of human cognition. This book evaluates the strengths and limitations of people and AI. The authors' expertise equips them well to consider this by seeing how well (or badly) AI compares to human intelligence. They accept that AI matches or exceeds human ability in many spheres such as mathematical calculations, complex games (e.g., chess, Go, and poker), diagnosis from medical images, and robotic surgery. However, the human tendency to anthropomorphise has led many people to claim mistakenly that AI systems can think, infer, reason, and understand while engaging in information processing. In fact, such systems lack all those cognitive skills and are also deficient in the quintessentially human abilities of flexibility of thinking and general intelligence. At a time when human commitment to AI appears unstoppable, this up-to-date book advocates a symbiotic and co-operative relationship between humans and AI. It will be essential reading for anyone interested in AI and human cognition.
Amid recent interest in Clifford algebra for dual quaternions as a more suitable method for Computer Graphics than standard matrix algebra, this book presents dual quaternions and their associated Clifford algebras in a new light, accessible to and geared towards the Computer Graphics community. Collating all the associated formulas and theorems in one place, this book provides an extensive and rigorous treatment of dual quaternions, as well as showing how two models of Clifford algebras emerge naturally from the theory of dual quaternions. Each chapter comes complete with a set of exercises to help readers sharpen and practice their knowledge. This book is accessible to anyone with a basic knowledge of quaternion algebra and is of particular use to forward-thinking members of the Computer Graphics community. .
Get up to speed with your new MacBook Pro or MacBook Air faster than you thought possible In Teach Yourself VISUALLY: MacBook Pro & MacBook Air, technology educator extraordinaire and bestselling author Guy Hart-Davis delivers a highly illustrated and easy-to-follow guide to using your MacBook Pro or MacBook Air with macOS Monterey. In the book, you'll get up and running quickly whether you're brand new to computers or just transitioning from an older Mac or a PC. With the graphics-driven approach used successfully by tens of thousands of readers of the Teach Yourself VISUALLY series, you see exactly what each step of instruction should look like on your own screen and can follow--step-by-step--through the installation process, file management, email, and messaging, and much more. You'll also: Become expert with the latest macOS version--Monterey--and the newest features that enable you to make the most of your MacBook and the Internet Learn exactly how to handle the most common and useful everyday tasks you need to get stuff done Glean valuable customization tips to make your MacBook work just the way you prefer Teach Yourself VISUALLY: MacBook Pro & MacBook Air skips confusing tech jargon in favor of clear pictures, simple instructions, and stepwise guidance that will give you a flying start to using your new MacBook, regardless of your experience level.
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
Revealing the flaws in human decision making, this book explores how AI can be used to optimise decisions for improved business outcomes and efficiency, as well as looking ahead into the significant contributions Decision Intelligence (DI) can make to society and the ethical challenges it may raise. Offering an impressive framework of Decision Intelligence (DI), from the theories and concepts used to design autonomous intelligent agents to the technologies that power DI systems and the ways in which companies use decision-making building blocks to build DI solutions that enable businesses to democratise AI, this book provides a systematic approach to AI intelligence and human involvement. Replete with case studies on DI application, as well as wider discussions on the social implications of the technology, this book appeals to both students of AI and data solutions and businesses considering DI adoption.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
• Describes machine learning in plain language to a non-technical audience • Explains how to manage machine learning projects to deliver value • Highlights important considerations when deploying machine learning systems in organisations
What will you do when your AI misbehaves? The promise of artificial intelligence is automated decision-making at scale, but that means AI also automates risk at scale. Are you prepared for that risk? Already, many companies have suffered real damage when their algorithms led to discriminatory, privacy-invading, and even deadly outcomes. Self-driving cars have hit pedestrians; HR algorithms have precluded women from job searches; mortgage systems have denied loans to qualified minorities. And often the companies who deployed the AI couldn't explain why the black box made the decision it did. In this environment, AI ethics isn't merely an academic curiosity, it's a business necessity. In Ethical Machines, Reid Blackman gives you all you need to understand AI ethics as a risk management challenge. He'll help you build, procure, and deploy AI in a way that's not only ethical but also safe in terms of your organization's reputation, regulatory compliance, and legal standing-and do it at scale. And don't worry-the book's purpose is to get work done, not to ponder deep and existential questions about ethics and technology. Blackman's clear and accessible writing helps make a complex and often misunderstood concept like ethics easy to grasp. Most importantly, Blackman makes ethics actionable by tackling the big three ethical risks with AI-bias, explainability, and privacy-and tells you what to do (and what not to do) to mitigate them. With practical approaches to everything from writing a strong statement of AI ethics principles to creating teams that effectively evaluate ethical risks, Ethical Machines is the one guide you need to ensure your AI advances your company's objectives instead of undermining them.
Presents concepts of data for business decision making as well as algorithms and models used to analyze data used to solve business problems. Use data analytics to inform decisions related to product price and possession utilities Market products on the basis of consumer analytics
Broadens the horizons of Chinese culture enthusiasts without expertise in animation, and helps to dismantle stereotypical perceptions of Chinese animated film culture as established in the discourses of Western animation studios. Answers the rising need for conducting thorough studies of Chinese mass culture and mechanisms of soft power and indoctrination, and thus helps to understand the cultural identity and heritage of China, which is becoming a global superpower and an aspiring world economic leader. Complements a niche existing in the general knowledge on Asian popular cultures.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
Features Focus on the foundational theory underpinning Reinforcement Learning Suitable as a primary text for courses in Reinforcement Learning, but also as supplementary reading for applied/financial mathematics, programming, and other related courses Suitable for a professional audience of quantitative analysts or industry specialists Blends theory/mathematics, programming/algorithms and real-world financial nuances while always striving to maintain simplicity and to build intuitive understanding.
This book provides critical commentary on key issues around virtual reality, using media technology as a tool to challenge perspectives for learning and understanding cultural diversities. With a focus on empathy, embodiment and ethics, the book interrogates the use of immersive technologies for formal and informal educational contexts. Taking a critical approach to discourses around emerging technology and learning, the book presents the idea that a new literacy is emerging and an emphasis on media and technology is needed in the context of education to explore and experience cultural diversities. Employing a personal reflexive narrative, the chapters highlight key issues through research and interviews with leading practitioners in the field. Understanding Virtual Reality will be of great interest to academics and students interested in the effects of immersive realities on the education experience, and to anyone keen on exploring the paradigm shift from entertainment to education.
Proven best practices for success with every Azure networking service For cloud environments to operate and scale optimally, their networking services must be designed, deployed, and managed well. Now, there's a complete, best-practice guide to doing just that. Writing for everyone involved in delivering Azure workloads and services, leading cloud consultant Avinash Valiramani provides a deep dive and practical field advice for Azure Virtual Networks, Azure VPN Gateways, Azure Load Balancing, Azure Traffic Manager, Azure Firewall, Azure DNS, Azure Bastion, Azure Front Door and more. Whatever your role in delivering efficient, scalable networking services, this guide will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Use Azure Virtual Networks to establish a backbone for hosting other Azure resources Provide HTTP/HTTPS load-balancing and routing for web servers and apps through Azure Application Gateway Connect on-premises and other public networks to Azure for secure communications using the Azure VPN Gateway service Provide secure load balancing to apps from internal and public networks using Azure Load Balancer services Integrate Azure Firewall to centrally protect Azure resources across multiple subscriptions Access globally scaled, fully-managed DNS services with 100% SLA from the closest Azure DNS servers Provide optimal network routing to the closest application endpoint for public-facing applications with Azure Traffic Manager Use Microsoft's global edge network along with Azure Front Door to speed up access, harden security and enhance scalability for consuming-facing and internal web applications Also look for these Definitive Guides to Azure success: Microsoft Azure Compute: The Definitive Guide Microsoft Azure Monitoring and Management: The Definitive Guide Microsoft Azure Storage: The Definitive Guide
Learning Java Through Games teaches students how to use the different features of the Java language as well as how to program. Suitable for self-study or as part of a two-course introduction to programming, the book covers as much material as possible from the latest Java standard while requiring no previous programming experience. Taking an application-motivated approach, the text presents an abundance of games. Students must read through the whole chapter to understand all the features that are needed to implement the game. Most chapters start with a description of a game and then introduce different Java constructs for implementing the features of the game on need-to-use bases. The text teaches students not only how to write code that works but also how to follow good software practices. All sample programs in the text strive to achieve low cohesion and high coupling-the hallmarks of well-designed code. Many programs are refactored multiple times to achieve code that is easy to understand, reuse, and maintain. The first part of the book covers basic programming techniques, such as conditional statements, loops, methods, arrays, and classes. The second part focuses on more advanced topics, including class inheritance, recursions, sorting algorithms, GUI programming, exception handling, files, and applets.
Blockchain for IoT provides the basic concepts of Blockchain technology and its applications to varied domains catering to socio-technical fields. It also introduces intelligent Blockchain platforms by way of infusing elements of computational intelligence into Blockchain technology. With the help of an interdisciplinary approach, it includes insights into real-life IoT applications to enable the readers to assimilate the concepts with ease. This book provides a balanced approach between theoretical understanding and practical applications. Features: A self-contained approach to integrating the principles of Blockchain with elements of computational intelligence A rich and novel foundation of Blockchain technology with reference to the internet of things conjoined with the tenets of artificial intelligence in yielding intelligent Blockchain platforms Elucidates essential background, concepts, definitions, and theories thereby putting forward a complete treatment on the subject Information presented in an accessible way for research students of computer science and information technology, as well as software professionals who can inherit the much-needed developmental ideas to boost up their computing knowledge on distributed platforms This book is aimed primarily at undergraduates, postgraduates, and researchers studying Blockchain. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
|