0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (377)
  • R500+ (14,505)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Multilevel Modeling - Methodological Advances, Issues, and Applications (Paperback, New edition): Steven P. Reise, Naihua Duan Multilevel Modeling - Methodological Advances, Issues, and Applications (Paperback, New edition)
Steven P. Reise, Naihua Duan
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world.

The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis.

This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.

Strategic Information Security (Hardcover): John Wylder Strategic Information Security (Hardcover)
John Wylder
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.

Strategic Information Security integrates the importance of sound security policy with the strategic goals of an organization. It provides IT professionals and management with insight into the issues surrounding the goals of protecting valuable information assets. This text reiterates that an effective information security program relies on more than policies or hardware and software, instead it hinges on having a mindset that security is a core part of the business and not just an afterthought.

Armed with the content contained in this book, security specialists can redirect the discussion of security towards the terms and concepts that management understands. This increases the likelihood of obtaining the funding and managerial support that is needed to build and maintain airtight security programs.

Applications of Data Management and Analysis - Case Studies in Social Networks and Beyond (Hardcover, 1st ed. 2018): Mohammad... Applications of Data Management and Analysis - Case Studies in Social Networks and Beyond (Hardcover, 1st ed. 2018)
Mohammad Moshirpour, Behrouz H Far, Reda Alhajj
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

This book addresses and examines the impacts of applications and services for data management and analysis, such as infrastructure, platforms, software, and business processes, on both academia and industry. The chapters cover effective approaches in dealing with the inherent complexity and increasing demands of big data management from an applications perspective. Various case studies included have been reported by data analysis experts who work closely with their clients in such fields as education, banking, and telecommunications. Understanding how data management has been adapted to these applications will help students, instructors and professionals in the field. Application areas also include the fields of social network analysis, bioinformatics, and the oil and gas industries.

Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017): Chuan Shi, Philip S. Yu Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017)
Chuan Shi, Philip S. Yu
R4,305 Discovery Miles 43 050 Ships in 10 - 15 working days

This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.

Data Science - What the Best Data Scientists Know About Data Analytics, Data Mining, Statistics, Machine Learning, and Big Data... Data Science - What the Best Data Scientists Know About Data Analytics, Data Mining, Statistics, Machine Learning, and Big Data - That You Don't (Hardcover)
Herbert Jones
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
Data Mining and Multi-agent Integration (Hardcover, 2009 ed.): Longbing Cao Data Mining and Multi-agent Integration (Hardcover, 2009 ed.)
Longbing Cao
R4,192 Discovery Miles 41 920 Ships in 18 - 22 working days

Data Mining and Multi agent Integration aims to re?ect state of the art research and development of agent mining interaction and integration (for short, agent min ing). The book was motivated by increasing interest and work in the agents data min ing, and vice versa. The interaction and integration comes about from the intrinsic challenges faced by agent technology and data mining respectively; for instance, multi agent systems face the problem of enhancing agent learning capability, and avoiding the uncertainty of self organization and intelligence emergence. Data min ing, if integrated into agent systems, can greatly enhance the learning skills of agents, and assist agents with predication of future states, thus initiating follow up action or intervention. The data mining community is now struggling with mining distributed, interactive and heterogeneous data sources. Agents can be used to man age such data sources for data access, monitoring, integration, and pattern merging from the infrastructure, gateway, message passing and pattern delivery perspectives. These two examples illustrate the potential of agent mining in handling challenges in respective communities. There is an excellent opportunity to create innovative, dual agent mining interac tion and integration technology, tools and systems which will deliver results in one new technology.

Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and... Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain (Hardcover, New edition)
Csilla Farkas, Pierangela Samarati
R2,868 Discovery Miles 28 680 Ships in 18 - 22 working days

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.

Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997): Richard Bentley, Uwe... Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997)
Richard Bentley, Uwe Busbach, David Kerr, Klaas Sikkel
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.

Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Animesh... Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service.

Foreword by The Hon. Louis J. Freeh."

Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017):... Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017)
Laila El Aimani
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

The Austin Protocol Compiler (Hardcover, 2005 ed.): Tommy M McGuire, Mohamed G Gouda The Austin Protocol Compiler (Hardcover, 2005 ed.)
Tommy M McGuire, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract Protocol (or TAP, for short) notation. This notation is greatly influenced by the Abstract Protocol Notation in the textbook Elements of Network Protocol Design, written by the second author, Mohamed G. Gouda. The TAP notation has two types of sem- tics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics thatappeals to the protocol implementors group.

Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making... Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making (Hardcover, 2012 ed.)
Yannis Charalabidis, Sotirios Koussouris
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government. Moving towards open governance roadmaps worldwide, electronic participation and citizen engagement stand out as a new domain, important both for decision makers and citizens; and over the last decade, there have been a variety of related pilot projects and innovative approaches.

With contributions from leading researchers, Charalabidis and Koussouris provide the latest research findings such as theoretical foundations, principles, methodologies, architectures, technical frameworks, cases and lessons learnt within the domain of open, collaborative governance and online citizen engagement. The book is divided into three sections: Section one, "Public Policy Debate Foundations," lays the foundations regarding processes and methods for scoping, planning, evaluating and transforming citizen engagement. The second section, "Information and Communication Technologies for Citizen Participation," details practical approaches to designing and creating collaborative governance infrastructures and citizen participation for businesses and administrations. Lastly, the third section on "Future Research Directions of Open, Collaborative ICT-enabled Governance" provides a constructive critique of the developments in the past and presents prospects regarding future challenges and research directions.

The book is mainly written for academic researchers and graduate students working in the computer, social, political and management sciences. Its audience includes researchers and practitioners in e-Governance, public administration officials, policy and decision makers at the local, national and international level engaged in the design and creation of policies and services, and ICT professionals engaged in e-Governance and policy modelling projects and solutions.

Languages, Compilers and Run-Time Systems for Scalable Computers (Hardcover, 1996 ed.): Boleslaw K. Szymanski, Balaram Sinharoy Languages, Compilers and Run-Time Systems for Scalable Computers (Hardcover, 1996 ed.)
Boleslaw K. Szymanski, Balaram Sinharoy
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

Language, Compilers and Run-time Systems for Scalable Computers contains 20 articles based on presentations given at the third workshop of the same title, and 13 extended abstracts from the poster session. Starting with new developments in classical problems of parallel compiler design, such as dependence analysis and an exploration of loop parallelism, the book goes on to address the issues of compiler strategy for specific architectures and programming environments. Several chapters investigate support for multi-threading, object orientation, irregular computation, locality enhancement, and communication optimization. Issues of the interface between language and operating system support are also discussed. Finally, the load balance issues are discussed in different contexts, including sparse matrix computation and iteratively balanced adaptive solvers for partial differential equations. Some additional topics are also discussed in the extended abstracts. Each chapter provides a bibliography of relevant papers and the book can thus be used as a reference to the most up-to-date research in parallel software engineering.

Multilevel Modeling - Methodological Advances, Issues, and Applications (Hardcover): Steven P. Reise, Naihua Duan Multilevel Modeling - Methodological Advances, Issues, and Applications (Hardcover)
Steven P. Reise, Naihua Duan
R4,511 Discovery Miles 45 110 Ships in 10 - 15 working days

This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world.

The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis.

This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.

Nontraditional Database Systems (Hardcover): Yahiko Kambayashi, Katsumi Tanaka, Masaru Kitsuregawa, Akifumi Makinouchi,... Nontraditional Database Systems (Hardcover)
Yahiko Kambayashi, Katsumi Tanaka, Masaru Kitsuregawa, Akifumi Makinouchi, Shunsuke Uemura, …
R5,352 Discovery Miles 53 520 Ships in 10 - 15 working days


Nontraditional Database Systems is the fifth volume in the Advanced Information Processing Technology series. It brings together the results of research carried out by the Japanese database research community in the field of nontraditional database systems.

The book examines nontraditional types of applications, data types, systems and environments together with high-performance architecture to support nontraditional applications, such as web mining, data engineering and object processing.

eBook available with sample pages: 0203301943

Machine Learning for Decision Sciences with Case Studies in Python (Hardcover): S. Sumathi, Suresh Rajappa, L Ashok Kumar,... Machine Learning for Decision Sciences with Case Studies in Python (Hardcover)
S. Sumathi, Suresh Rajappa, L Ashok Kumar, Surekha Paneerselvam
R5,276 Discovery Miles 52 760 Ships in 9 - 17 working days

Explains the basic concepts of Python and its role in machine learning Provides comprehensive coverage of feature-engineering including real-time case studies Perceive the structural patterns with reference to data science and statistics and analytics Includes machine learning based structured exercises Appreciates different algorithmic concepts of machine learning including unsupervised, supervised and reinforcement learning

Introduction to Constraint Databases (Hardcover, 2002 ed.): Peter Revesz Introduction to Constraint Databases (Hardcover, 2002 ed.)
Peter Revesz
R2,051 R1,692 Discovery Miles 16 920 Save R359 (18%) Ships in 10 - 15 working days

Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in relational databases. "Introduction to Constraint Databases" comprehensively covers both constraint-database theory and several sample systems. The book reveals how constraint databases bring together techniques from a variety of fields, such as logic and model theory, algebraic and computational geometry, and symbolic computation, to the design and analysis of data models and query languages. Constraint databases are shown to be powerful and simple tools for data modeling and querying in application areas¿such as environmental modeling, bioinformatics, and computer vision--that are not suitable for relational databases. Specific applications are examined in geographic information systems, spatiotemporal data management, linear programming, genome databases, model checking of automata, and other areas. Topics and features: *Offers a database perspective and a focus on simplicity at the user level *Utilizes simple tools for determining whether queries are safe or not *Incorporates scientist-supplied descriptions of applications *Explains constraint databases from a developer's viewpoint *Provides extensive exercise sets, and sample software systems, that facilitate rapid learning of the topic within a real-world software context This volume presents a comprehensive introduction to the theory and applications of constraint database systems, which provide new methods for the design of data models and query languages. It is an essential resource for advanced students, practitioners, and professionals in computer science, database systems, and information systems.

Digital Watermarking for Digital Media (Hardcover): Digital Watermarking for Digital Media (Hardcover)
R2,238 Discovery Miles 22 380 Ships in 18 - 22 working days

Digital Watermarking for Digital Media discusses the new aspects of digital watermarking in a worldwide context. Approached not only from the technical side, but the business and legal sides as well, this book discusses digital watermarking as it relates to many areas of digital media. Broad in its approach, Digital Watermarking for Digital Media provides a comprehensive overview not provided by any texts. Students in information technology, law, multimedia design, and economics will all find valuable material here. But this book is not limited to only students. Artists, composers, lawyers, and publishers will all find value in this digital watermarking book.

Astronomical Image and Data Analysis (Hardcover, 2nd ed. 2006): J.-L. Starck, F. Murtagh Astronomical Image and Data Analysis (Hardcover, 2nd ed. 2006)
J.-L. Starck, F. Murtagh
R5,297 Discovery Miles 52 970 Ships in 10 - 15 working days

Thisbookpresentsmaterialwhichismorealgorithmicallyorientedthanmost alternatives.Italsodealswithtopicsthatareatorbeyondthestateoftheart. Examples include practical and applicable wavelet and other multiresolution transform analysis. New areas are broached like the ridgelet and curvelet transforms. The reader will ?nd in this book an engineering approach to the interpretation of scienti?c data. Compared to the 1st Edition, various additions have been made throu- out, and the topics covered have been updated. The background or en- ronment of this book's topics include continuing interest in e-science and the virtual observatory, which are based on web based and increasingly web service based science and engineering. Additional colleagues whom we would like to acknowledge in this 2nd edition include: Bedros Afeyan, Nabila Aghanim, Emmanuel Cand' es, David Donoho, Jalal Fadili, and Sandrine Pires, We would like to particularly - knowledge Olivier Forni who contributed to the discussion on compression of hyperspectral data, Yassir Moudden on multiwavelength data analysis and Vicent Mart' ?nez on the genus function. The cover image to this 2nd edition is from the Deep Impact project. It was taken approximately 8 minutes after impact on 4 July 2005 with the CLEAR6 ?lter and deconvolved using the Richardson-Lucy method. We thank Don Lindler, Ivo Busko, Mike A'Hearn and the Deep Impact team for the processing of this image and for providing it to us.

Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes (Hardcover): Wahiba Ben Abdessalem Karaa, Nilanjan... Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes (Hardcover)
Wahiba Ben Abdessalem Karaa, Nilanjan Dey
R5,607 Discovery Miles 56 070 Ships in 18 - 22 working days

Every second, users produce large amounts of image data from medical and satellite imaging systems. Image mining techniques that are capable of extracting useful information from image data are becoming increasingly useful, especially in medicine and the health sciences. Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes addresses major techniques regarding image processing as a tool for disease identification and diagnosis, as well as treatment recommendation. Highlighting current research intended to advance the medical field, this publication is essential for use by researchers, advanced-level students, academicians, medical professionals, and technology developers. An essential addition to the reference material available in the field of medicine, this timely publication covers a range of applied research on data mining, image processing, computational simulation, data visualization, and image retrieval.

Detecting Regime Change in Computational Finance - Data Science, Machine Learning and Algorithmic Trading (Paperback): Junchen,... Detecting Regime Change in Computational Finance - Data Science, Machine Learning and Algorithmic Trading (Paperback)
Junchen, Edward P K Tsang
R1,430 Discovery Miles 14 300 Ships in 9 - 17 working days

Based on interdisciplinary research into "Directional Change", a new data-driven approach to financial data analysis, Detecting Regime Change in Computational Finance: Data Science, Machine Learning and Algorithmic Trading applies machine learning to financial market monitoring and algorithmic trading. Directional Change is a new way of summarising price changes in the market. Instead of sampling prices at fixed intervals (such as daily closing in time series), it samples prices when the market changes direction ("zigzags"). By sampling data in a different way, this book lays out concepts which enable the extraction of information that other market participants may not be able to see. The book includes a Foreword by Richard Olsen and explores the following topics: Data science: as an alternative to time series, price movements in a market can be summarised as directional changes Machine learning for regime change detection: historical regime changes in a market can be discovered by a Hidden Markov Model Regime characterisation: normal and abnormal regimes in historical data can be characterised using indicators defined under Directional Change Market Monitoring: by using historical characteristics of normal and abnormal regimes, one can monitor the market to detect whether the market regime has changed Algorithmic trading: regime tracking information can help us to design trading algorithms It will be of great interest to researchers in computational finance, machine learning and data science. About the Authors Jun Chen received his PhD in computational finance from the Centre for Computational Finance and Economic Agents, University of Essex in 2019. Edward P K Tsang is an Emeritus Professor at the University of Essex, where he co-founded the Centre for Computational Finance and Economic Agents in 2002.

Invitations to Tender for Facility Management Services - Process Mapping, Service Specifications and Innovative Scenarios... Invitations to Tender for Facility Management Services - Process Mapping, Service Specifications and Innovative Scenarios (Hardcover, 1st ed. 2019)
Cinzia Talamo, Nazly Atta
R2,675 Discovery Miles 26 750 Ships in 18 - 22 working days

This book deals with Invitations to Tender (ITTs) for the provision of Facility Management (FM) services. It presents a framework to support companies in preparing clear, comprehensive and effective ITTs, focusing on such key aspects as: organizational structures, tools and procedures for managing information, allocation of information responsibilities, procedures for services monitoring and control, quality policies, and risk management. It discusses and analyzes a range of basic terms and concepts, procedures, and international standards concerning the Tendering Process, as well as the contents of ITTs, which should represent the translation of information needs into requirements related to: the client's goals, main categories of information to deal with, expected organization of information, modalities of reporting and control, and level of knowledge to be reached. A further major focus is on potential key innovation scenarios concerning current FM practice, such as Sustainable Procurement, Building Information Modeling (BIM), Big Data and Internet of Things (IoT) technologies, highlighting both the possible benefits and the possible risks and implications that could negatively affect the quality of FM service provision if not properly treated within the ITT. The book will be of interest to real estate owners, demand organizations and facility managers, enhancing their ability to prepare, interpret and/or critically analyze ITTs.

Web Mining - Applications and Techniques (Hardcover, New): Web Mining - Applications and Techniques (Hardcover, New)
R2,408 Discovery Miles 24 080 Ships in 18 - 22 working days

Web mining is moving the World Wide Web toward a more useful environment in which users can quickly and easily find the information they need. Web mining uses document content, hyperlink structure, and usage statistics to assist users in meeting their needed information. This book provides a record of current research and practical applications in Web searching. It includes techniques that will improve the utilization of the Web by the design of Websites, as well as the design and application of search agents. This book presents this research and related applications in a manner that encourages additional work toward improving the reduction of information overflow, which is so common today in Web search results.

Information Warfare (Paperback): William Hutchinson, Matthew Warren Information Warfare (Paperback)
William Hutchinson, Matthew Warren
R1,806 Discovery Miles 18 060 Ships in 10 - 15 working days

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.
This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful.
Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced.
Addresses the issues and implications of cyber warfare and how it directly impacts on companies

Big Data Analytics - Harnessing Data for New Business Models (Hardcover): Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi Big Data Analytics - Harnessing Data for New Business Models (Hardcover)
Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi
R3,950 Discovery Miles 39 500 Ships in 9 - 17 working days

This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
M Programming: A Comprehensive Guide
Richard Walters Paperback R2,122 Discovery Miles 21 220
Green and Sustainable Computing: Part…
Atif Memon Hardcover R3,691 Discovery Miles 36 910
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,189 R1,762 Discovery Miles 17 620
New Financing for Distressed Businesses…
Sanford U. Mba Hardcover R3,362 Discovery Miles 33 620
Blockchain Technology: Platforms, Tools…
Pethuru Raj, Ganesh Chandra Deka Hardcover R4,211 Discovery Miles 42 110
Beyond the Algorithm - Qualitative…
Deepa Das Acevedo Paperback R971 Discovery Miles 9 710
Applied Structural Equation Modelling…
Indranarain Ramlall Hardcover R3,226 Discovery Miles 32 260
Regulating the Crypto Economy - Business…
Iris H-Y Chiu Hardcover R3,356 Discovery Miles 33 560
Abuse of Dominant Position: New…
Mark-Oliver Mackenrodt, Beatriz Conde Gallego, … Hardcover R2,661 Discovery Miles 26 610
Law Of Intellectual Property In South…
Coenraad Visser Paperback R1,216 Discovery Miles 12 160

 

Partners