Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Databases
This book aims at helping software teams work more efficiently by setting up their own design processes In a world where being able to satisfy users' needs becomes a crucial element for products' existence, this book helps organizations understand design processes, allowing them efficiently deliver experiences that address the real problems of their audiences. This book offers a combination of theory and practice that will help its readers understand how to design efficient processes and apply this knowledge in their own work. A large volume of insights in the form of colorful images and doodles.
Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.
This book illustrates the current work of leading multilevel
modeling (MLM) researchers from around the world. The book's goal is to critically examine the real problems that
occur when trying to use MLMs in applied research, such as power,
experimental design, and model violations. This presentation of
cutting-edge work and statistical innovations in multilevel
modeling includes topics such as growth modeling, repeated measures
analysis, nonlinear modeling, outlier detection, and meta
analysis. This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.
Pulling aside the curtain of 'Big Data' buzz, this book introduces C-suite and other non-technical senior leaders to the essentials of obtaining and maintaining accurate, reliable data, especially for decision-making purposes. Bad data begets bad decisions, and an understanding of data fundamentals - how data is generated, organized, stored, evaluated, and maintained - has never been more important when solving problems such as the pandemic-related supply chain crisis. This book addresses the data-related challenges that businesses face, answering questions such as: What are the characteristics of high-quality data? How do you get from bad data to good data? What procedures and practices ensure high-quality data? How do you know whether your data supports the decisions you need to make? This clear and valuable resource will appeal to C-suite executives and top-line managers across industries, as well as business analysts at all career stages and data analytics students.
This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world. The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis. This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.
As data is an important asset for any organization, it is essential to apply semantic technologies in data science to fulfill the need of any organization. This volume of a two-volume handbook set provides a roadmap for new trends and future developments of data science with semantic technologies. Data Science with Semantic Technologies: New Trends and Future Developments highlights how data science enables the user to create intelligence through these technologies. In addition, this book offers the answers to various questions such as can semantic technologies be able to facilitate data science? Which type of data science problems can be tackled by semantic technologies? How can data scientists get benefited from these technologies? What is the role of semantic technologies in data science? What is the current progress and future of data science with semantic technologies? Which types of problems require the immediate attention of the researchers? What should be the vision 2030 for data science? This volume can serve as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for scholars, researchers, professionals, and practitioners in this field.
Gone are the days when data was interlinked with related data by humans and to find insights coherently, human interpretation was required. Data is no more just data. It is now considered a Thing or Entity or Concept- to bring the meaning to it, so that a machine not only understands the concept but also extrapolates the way humans do. Data Science with Semantic Technologies: Deployment and Exploration volume of a two-volume handbook set provides a roadmap for the deployment of semantic technologies in the field of data science and enables the user to create intelligence through these technologies by exploring the opportunities and eradicating the challenges in the current and future time frame. In addition, this book offers the answer to various questions like What makes a technology semantic as opposed to other approaches to data science? What is knowledge data science? How does knowledge data science relate to other fields? This book explores the optimal use of these technologies to provide the highest benefit to the user under one comprehensive source and title. As there is no dedicated book available in the market on this topic at this time, this proposed new book becomes a unique and only resource for scholars, researchers, data scientists, professionals, and practitioners. This volume can serve as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for scholars, researchers, professionals, and practitioners in this field.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.
Industry 4.0 is the latest technological innovation in manufacturing with the goal to increase productivity in a flexible and efficient manner. Changing the way in which manufacturers operate, this revolutionary transformation is powered by various technology advances including Big Data analytics, Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. Big Data analytics has been identified as one of the significant components of Industry 4.0, as it provides valuable insights for smart factory management. Big Data and Industry 4.0 have the potential to reduce resource consumption and optimize processes, thereby playing a key role in achieving sustainable development. Big Data Applications in Industry 4.0 covers the recent advancements that have emerged in the field of Big Data and its applications. The book introduces the concepts and advanced tools and technologies for representing and processing Big Data. It also covers applications of Big Data in such domains as financial services, education, healthcare, biomedical research, logistics, and warehouse management. Researchers, students, scientists, engineers, and statisticians can turn to this book to learn about concepts, technologies, and applications that solve real-world problems. Features An introduction to data science and the types of data analytics methods accessible today An overview of data integration concepts, methodologies, and solutions A general framework of forecasting principles and applications, as well as basic forecasting models including naive, moving average, and exponential smoothing models A detailed roadmap of the Big Data evolution and its related technological transformation in computing, along with a brief description of related terminologies The application of Industry 4.0 and Big Data in the field of education The features, prospects, and significant role of Big Data in the banking industry, as well as various use cases of Big Data in banking, finance services, and insurance Implementing a Data Lake (DL) in the cloud and the significance of a data lake in decision making
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
This text introduces the concepts of information warfare from a
non-military, organizational perspective. It is designed to
stimulate managers to develop policies, strategies, and tactics for
the aggressive use and defence of their data and knowledge base.
The book covers the full gambit of information warfare subjects
from the direct attack on computer systems to the more subtle
psychological technique of perception management. It provides the
framework needed to build management strategies in this area. The
topics covered include the basics of information warfare, corporate
intelligence systems, the use of deception, security of systems,
modes of attack, a methodology to develop defensive measures, plus
specific issues associated with information warfare.
Volume I is the first of two volumes that document the three
components of the CHILDES Project. It is divided into two parts
which provide an introduction to the use of computational tools for
studying language learning. The first part is the CHAT manual,
which describes the conventions and principles of CHAT
transcription and recommends specific methods for data collection
and digitization. The second part is the CLAN manual, which
describes the uses of the editor, sonic CHAT, and the various
analytic commands. The book will be useful for both novice and
experienced users of the CHILDES tools, as well as instructors and
students working with transcripts of child language.
Written by leading industry experts, the Data Management Handbook is a comprehensive, single-volume guide to the most innovative ideas on ho w to plan, develop, and run a powerful data management function - as w ell as handle day-to-day operations. The book provides practical, hand s-on guidance on the strategic, tactical, and technical aspects of dat a management, offering an inside look at how leading companies in vari ous industries meet the challenges of moving to a data-sharing environ ment.
Up relevance scores, improve page speed, optimize voice search questions, and more! Search Engine Optimization For Dummies shows website owners, developers, and search engine optimizers (SEOs) how to create a website that ranks at the top of search engines and has high-volume traffic, while answering the essential question of "how do I get people to visit my site?" By understanding search engine basics (what are they, which ones are important, how to get started), building a search engine-friendly site, registering your site with directories and indexes, using analysis tools to track results and link popularity to boost rankings, and advertising your site by using pay-per-click options, you can use the tricks of SEO masters to drive traffic to your site. You'll also discover how to write effective content, use social media to boost your profile, and manage your platform and reputation to positively impact your search engine rankings. Develop a search strategy and use new SERP features Maximize the effects of personalized search Analyze results with improved analytics tools Optimize voice search strategies There's no time like the present to create a website that ranks at the top of search engines and drives traffic to your site with these tips, tricks, and secrets.
Data is at the center of many challenges in system design today. Difficult issues need to be figured out, such as scalability, consistency, reliability, efficiency, and maintainability. In addition, we have an overwhelming variety of tools, including NoSQL datastores, stream or batch processors, and message brokers. What are the right choices for your application? How do you make sense of all these buzzwords? In this practical and comprehensive guide, author Martin Kleppmann helps you navigate this diverse landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications. Peer under the hood of the systems you already use, and learn how to use and operate them more effectively Make informed decisions by identifying the strengths and weaknesses of different tools Navigate the trade-offs around consistency, scalability, fault tolerance, and complexity Understand the distributed systems research upon which modern databases are built Peek behind the scenes of major online services, and learn from their architecture
Mobile Data Visualization is about facilitating access to and understanding of data on mobile devices. Wearable trackers, mobile phones, and tablets are used by millions of people each day to read weather maps, financial charts, or personal health meters. What is required to create e ffective visualizations for mobile devices? This book introduces key concepts of mobile data visualization and discusses opportunities and challenges from both research and practical perspectives. Mobile Data Visualization is the first book to provide an overview of how to e ffectively visualize, analyze, and communicate data on mobile devices. Drawing from the expertise, research, and experience of an international range of academics and practitioners from across the domains of Visualization, Human Computer Interaction, and Ubiquitous Computing, the book explores the challenges of mobile visualization and explains how it diff ers from traditional data visualization. It highlights opportunities for reaching new audiences with engaging, interactive, and compelling mobile content. In nine chapters, this book presents interesting perspectives on mobile data visualization including: how to characterize and classify mobile visualizations; how to interact with them while on the go and with limited attention spans; how to adapt them to various mobile contexts; specific methods on how to design and evaluate them; reflections on privacy, ethical and other challenges, as well as an outlook to a future of ubiquitous visualization. This accessible book is a valuable and rich resource for visualization designers, practitioners, researchers, and students alike.
Why is big data analytics one of the hottest business topics today? This book will help accountants and financial managers better understand big data and analytics, including its history and current trends. It dives into the platforms and operating tools that will help you measure program impacts and ROI, visualize data and business processes, and uncover the relationship between key performance indicators. Key topics covered include: Evidence-based techniques for finding or generating data, selecting key performance indicators, isolating program effects Relating data to return on investment, financial values, and executive decision making Data sources including surveys, interviews, customer satisfaction, engagement, and operational data Visualizing and presenting complex results
"A First Course in Machine Learning by Simon Rogers and Mark Girolami is the best introductory book for ML currently available. It combines rigor and precision with accessibility, starts from a detailed explanation of the basic foundations of Bayesian analysis in the simplest of settings, and goes all the way to the frontiers of the subject such as infinite mixture models, GPs, and MCMC." -Devdatt Dubhashi, Professor, Department of Computer Science and Engineering, Chalmers University, Sweden "This textbook manages to be easier to read than other comparable books in the subject while retaining all the rigorous treatment needed. The new chapters put it at the forefront of the field by covering topics that have become mainstream in machine learning over the last decade." -Daniel Barbara, George Mason University, Fairfax, Virginia, USA "The new edition of A First Course in Machine Learning by Rogers and Girolami is an excellent introduction to the use of statistical methods in machine learning. The book introduces concepts such as mathematical modeling, inference, and prediction, providing 'just in time' the essential background on linear algebra, calculus, and probability theory that the reader needs to understand these concepts." -Daniel Ortiz-Arroyo, Associate Professor, Aalborg University Esbjerg, Denmark "I was impressed by how closely the material aligns with the needs of an introductory course on machine learning, which is its greatest strength...Overall, this is a pragmatic and helpful book, which is well-aligned to the needs of an introductory course and one that I will be looking at for my own students in coming months." -David Clifton, University of Oxford, UK "The first edition of this book was already an excellent introductory text on machine learning for an advanced undergraduate or taught masters level course, or indeed for anybody who wants to learn about an interesting and important field of computer science. The additional chapters of advanced material on Gaussian process, MCMC and mixture modeling provide an ideal basis for practical projects, without disturbing the very clear and readable exposition of the basics contained in the first part of the book." -Gavin Cawley, Senior Lecturer, School of Computing Sciences, University of East Anglia, UK "This book could be used for junior/senior undergraduate students or first-year graduate students, as well as individuals who want to explore the field of machine learning...The book introduces not only the concepts but the underlying ideas on algorithm implementation from a critical thinking perspective." -Guangzhi Qu, Oakland University, Rochester, Michigan, USA
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science. Features * Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place * Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0 * Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security * Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4.0 This book is primarily aimed at graduates, researchers and professionals working in the field of security. Executives concerned with security management, knowledge dissemination, information, and policy development for data and network security in different educational, government, and non-government organizations will also find this book useful.
Safety-critical systems are found in almost every sector of industry. Faults in these systems will result in a breach of safe operating conditions and exposure to the possible risk of major loss of life or catastrophic damage to plant, equipment or the environment. An understanding of the basis for the functioning of these systems is therefore vital to all involved in their operation. In particular, the interaction of the disciplines of software engineering, safety engineering, human factors and safety management is a total process whose entirety is not widely understood by those working in any of the individual fields. This book will redress that problem by providing an introduction to each constituent part with a cohesive structure and overview of the whole subject. It will be of interest to engineers, managers, students and anyone with responsibilities in these areas. |
You may like...
Handbook of Data Science with Semantic…
Archana Patel, Narayan C Debnath
Hardcover
R7,900
Discovery Miles 79 000
DAMA-DMBOK - Data Management Body of…
DAMA International
Paperback
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
R1,062
Discovery Miles 10 620
|