0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (61)
  • R250 - R500 (360)
  • R500+ (14,509)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics (Hardcover): Bhushan... Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics (Hardcover)
Bhushan Patil, Manisha Vohra
R9,481 Discovery Miles 94 810 Ships in 18 - 22 working days

Analyzing data sets has continued to be an invaluable application for numerous industries. By combining different algorithms, technologies, and systems used to extract information from data and solve complex problems, various sectors have reached new heights and have changed our world for the better. The Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics is a collection of innovative research on the methods and applications of data analytics. While highlighting topics including artificial intelligence, data security, and information systems, this book is ideally designed for researchers, data analysts, data scientists, healthcare administrators, executives, managers, engineers, IT consultants, academicians, and students interested in the potential of data application technologies.

Applying Data Science and Learning Analytics Throughout a Learner's Lifespan (Hardcover): Goran Trajkovski, Marylee... Applying Data Science and Learning Analytics Throughout a Learner's Lifespan (Hardcover)
Goran Trajkovski, Marylee Demeter, Heather Hayes
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Research in the domains of learning analytics and educational data mining has prototyped an approach where methodologies from data science and machine learning are used to gain insights into the learning process by using large amounts of data. As many training and academic institutions are maturing in their data-driven decision making, useful, scalable, and interesting trends are emerging. Organizations can benefit from sharing information on those efforts. Applying Data Science and Learning Analytics Throughout a Learner's Lifespan examines novel and emerging applications of data science and sister disciplines for gaining insights from data to inform interventions into learners' journeys and interactions with academic institutions. Data is collected at various times and places throughout a learner's lifecycle, and the learners and the institution should benefit from the insights and knowledge gained from this data. Covering topics such as learning analytics dashboards, text network analysis, and employment recruitment, this book is an indispensable resource for educators, computer scientists, faculty of higher education, government officials, educational administration, students of higher education, pre-service teachers, business professionals, researchers, and academicians.

Social Sensing - Building Reliable Systems on Unreliable Data (Paperback): Dong Wang, Tarek Abdelzaher, Lance Kaplan Social Sensing - Building Reliable Systems on Unreliable Data (Paperback)
Dong Wang, Tarek Abdelzaher, Lance Kaplan
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.

Next-Generation Information Retrieval and Knowledge Resources Management (Hardcover): Joan Lu Next-Generation Information Retrieval and Knowledge Resources Management (Hardcover)
Joan Lu
R6,177 Discovery Miles 61 770 Ships in 18 - 22 working days

Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Next-Generation Information Retrieval and Knowledge Resources Management is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as knowledge discovery, spatial indexing, and data mining, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.

Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover): J. Jackson Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover)
J. Jackson
R2,573 Discovery Miles 25 730 Ships in 18 - 22 working days

CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

Modern Database Management (Hardcover): Mitchell Penn Modern Database Management (Hardcover)
Mitchell Penn
R2,987 R2,715 Discovery Miles 27 150 Save R272 (9%) Ships in 18 - 22 working days
Innovative Research and Applications in Next-Generation High Performance Computing (Hardcover): Qusay F. Hassan Innovative Research and Applications in Next-Generation High Performance Computing (Hardcover)
Qusay F. Hassan
R5,258 Discovery Miles 52 580 Ships in 18 - 22 working days

High-performance computing (HPC) describes the use of connected computing units to perform complex tasks. It relies on parallelization techniques and algorithms to synchronize these disparate units in order to perform faster than a single processor could, alone. Used in industries from medicine and research to military and higher education, this method of computing allows for users to complete complex data-intensive tasks. This field has undergone many changes over the past decade, and will continue to grow in popularity in the coming years. Innovative Research Applications in Next-Generation High Performance Computing aims to address the future challenges, advances, and applications of HPC and related technologies. As the need for such processors increases, so does the importance of developing new ways to optimize the performance of these supercomputers. This timely publication provides comprehensive information for researchers, students in ICT, program developers, military and government organizations, and business professionals.

Optimizing the Display and Interpretation of Data (Paperback): Robert Warner Optimizing the Display and Interpretation of Data (Paperback)
Robert Warner
R834 Discovery Miles 8 340 Ships in 10 - 15 working days

"What information do these data reveal?" "Is the information correct?" "How can I make the best use of the information?" The widespread use of computers and our reliance on the data generated by them have made these questions increasingly common and important. Computerized data may be in either digital or analog form and may be relevant to a wide range of applications that include medical monitoring and diagnosis, scientific research, engineering, quality control, seismology, meteorology, political and economic analysis and business and personal financial applications. The sources of the data may be databases that have been developed for specific purposes or may be of more general interest and include those that are accessible on the Internet. In addition, the data may represent either single or multiple parameters. Examining data in its initial form is often very laborious and also makes it possible to "miss the forest for the trees" by failing to notice patterns in the data that are not readily apparent. To address these problems, this monograph describes several accurate and efficient methods for displaying, reviewing and analyzing digital and analog data. The methods may be used either singly or in various combinations to maximize the value of the data to those for whom it is relevant. None of the methods requires special devices and each can be used on common platforms such as personal computers, tablets and smart phones. Also, each of the methods can be easily employed utilizing widely available off-the-shelf software. Using the methods does not require special expertise in computer science or technology, graphical design or statistical analysis. The usefulness and accuracy of all the described methods of data display, review and interpretation have been confirmed in multiple carefully performed studies using independent, objective endpoints. These studies and their results are described in the monograph. Because of their ease of use, accuracy and efficiency, the methods for displaying, reviewing and analyzing data described in this monograph can be highly useful to all who must work with computerized information and make decisions based upon it.

Entity-Oriented Search (Hardcover): Krisztian Balog Entity-Oriented Search (Hardcover)
Krisztian Balog
R1,549 Discovery Miles 15 490 Ships in 18 - 22 working days
Collaborative Filtering Using Data Mining and Analysis (Hardcover): Vishal Bhatnagar Collaborative Filtering Using Data Mining and Analysis (Hardcover)
Vishal Bhatnagar
R4,949 Discovery Miles 49 490 Ships in 18 - 22 working days

Internet usage has become a normal and essential aspect of everyday life. Due to the immense amount of information available on the web, it has become obligatory to find ways to sift through and categorize the overload of data while removing redundant material. Collaborative Filtering Using Data Mining and Analysis evaluates the latest patterns and trending topics in the utilization of data mining tools and filtering practices. Featuring emergent research and optimization techniques in the areas of opinion mining, text mining, and sentiment analysis, as well as their various applications, this book is an essential reference source for researchers and engineers interested in collaborative filtering.

Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science (Hardcover): Mrutyunjaya Panda,... Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science (Hardcover)
Mrutyunjaya Panda, Harekrishna Misra
R7,766 Discovery Miles 77 660 Ships in 18 - 22 working days

In today's digital world, the huge amount of data being generated is unstructured, messy, and chaotic in nature. Dealing with such data, and attempting to unfold the meaningful information, can be a challenging task. Feature engineering is a process to transform such data into a suitable form that better assists with interpretation and visualization. Through this method, the transformed data is more transparent to the machine learning models, which in turn causes better prediction and analysis of results. Data science is crucial for the data scientist to assess the trade-offs of their decisions regarding the effectiveness of the machine learning model implemented. Investigating the demand in this area today and in the future is a necessity. The Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science provides an in-depth analysis on both the theoretical and the latest empirical research findings on how features can be extracted and transformed from raw data. The chapters will introduce feature engineering and the recent concepts, methods, and applications with the use of various data types, as well as examine the latest machine learning applications on the data. While highlighting topics such as detection, tracking, selection techniques, and prediction models using data science, this book is ideally intended for research scholars, big data scientists, project developers, data analysts, and computer scientists along with practitioners, researchers, academicians, and students interested in feature engineering and its impact on data.

Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer... Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security (Hardcover)
L. Reznik
R2,554 Discovery Miles 25 540 Ships in 10 - 15 working days

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Online Survey Design and Data Analytics - Emerging Research and Opportunities (Hardcover): Shalin Hai-Jew Online Survey Design and Data Analytics - Emerging Research and Opportunities (Hardcover)
Shalin Hai-Jew
R5,304 Discovery Miles 53 040 Ships in 18 - 22 working days

Online survey research suites offer a vast array of capabilities, supporting the presentation of virtually every type of digital data - text, imagery, audio, video, and multimedia forms. With some researcher sophistication, these online survey research suites can enable a wide range of quantitative, qualitative, and mixed methods research. Online Survey Design and Data Analytics: Emerging Research and Opportunities is a critical scholarly resource that explores the utilization of online platforms for setting up surveys to achieve a specific result, eliciting data in in-depth ways and applying creative analytics methods to online survey data. Highlighting topics such as coding, education-based analysis, and online Delphi studies, this publication is ideal for researchers, professionals, academicians, data analysts, IT consultants, and students.

Design Mind for Data Visualization - Learn to Use Information and Graphic Design Principles to Produce Engaging Data Stories... Design Mind for Data Visualization - Learn to Use Information and Graphic Design Principles to Produce Engaging Data Stories Your Audience Can't Ignore (Hardcover)
J. Storm
R1,126 Discovery Miles 11 260 Ships in 18 - 22 working days
Information Systems: A Digital World (Hardcover): Brian Jackson Information Systems: A Digital World (Hardcover)
Brian Jackson
R2,818 R2,564 Discovery Miles 25 640 Save R254 (9%) Ships in 18 - 22 working days
Intensional First-Order Logic - From AI to New SQL Big Data (Hardcover): Zoran Majkic Intensional First-Order Logic - From AI to New SQL Big Data (Hardcover)
Zoran Majkic
R4,558 Discovery Miles 45 580 Ships in 10 - 15 working days

This book introduces the properties of conservative extensions of First Order Logic (FOL) to new Intensional First Order Logic (IFOL). This extension allows for intensional semantics to be used for concepts, thus affording new and more intelligent IT systems. Insofar as it is conservative, it preserves software applications and constitutes a fundamental advance relative to the current RDB databases, Big Data with NewSQL, Constraint databases, P2P systems, and Semantic Web applications. Moreover, the many-valued version of IFOL can support the AI applications based on many-valued logics.

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,433 R3,098 Discovery Miles 30 980 Save R335 (10%) Ships in 18 - 22 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

Mathematical Foundations of Data Science Using R (Hardcover, 2nd Revised edition): Frank Emmert-Streib, Salissou Moutari,... Mathematical Foundations of Data Science Using R (Hardcover, 2nd Revised edition)
Frank Emmert-Streib, Salissou Moutari, Matthias Dehmer
R2,422 R1,949 Discovery Miles 19 490 Save R473 (20%) Ships in 18 - 22 working days

The aim of the book is to help students become data scientists. Since this requires a series of courses over a considerable period of time, the book intends to accompany students from the beginning to an advanced understanding of the knowledge and skills that define a modern data scientist. The book presents a comprehensive overview of the mathematical foundations of the programming language R and of its applications to data science.

Clinical Decision Support - The Road to Broad Adoption (Hardcover, 2nd edition): Robert Greenes Clinical Decision Support - The Road to Broad Adoption (Hardcover, 2nd edition)
Robert Greenes
R2,616 Discovery Miles 26 160 Ships in 10 - 15 working days

With at least 40% new or updated content since the last edition, "Clinical Decision Support," 2nd Edition explores the crucial new motivating factors poised to accelerate Clinical Decision Support (CDS) adoption. This book is mostly focused on the US perspective because of initiatives driving EHR adoption, the articulation of 'meaningful use', and new policy attention in process including the Office of the National Coordinator for Health Information Technology (ONC) and the Center for Medicare and Medicaid Services (CMS). A few chapters focus on the broader international perspective. "Clinical Decision Support," 2nd Edition explores the technology, sources of knowledge, evolution of successful forms of CDS, and organizational and policy perspectives surrounding CDS.

Exploring a roadmap for CDS, with all its efficacy benefits including reduced errors, improved quality, and cost savings, as well as the still substantial roadblocks needed to be overcome by policy-makers, clinicians, and clinical informatics experts, the field is poised anew on the brink of broad adoption. "Clinical Decision Support," 2nd Edition provides an updated and pragmatic view of the methodological processes and implementation considerations. This book also considers advanced technologies and architectures, standards, and cooperative activities needed on a societal basis for truly large-scale adoption.
At least 40% updated, and seven new chapters since the previous edition, with the new and revised content focused on new opportunities and challenges for clinical decision support at point of care, given changes in science, technology, regulatory policy, and healthcare financeInforms healthcare leaders and planners, health IT system developers, healthcare IT organization leaders and staff, clinical informatics professionals and researchers, and clinicians with an interest in the role of technology in shaping healthcare of the future

Handbook of Research on Big Data Management and Applications (Hardcover): Manoj Kumar Singh Handbook of Research on Big Data Management and Applications (Hardcover)
Manoj Kumar Singh
R4,941 Discovery Miles 49 410 Ships in 18 - 22 working days

"Big data" has become a commonly used term to describe large-scale and complex data sets which are difficult to manage and analyze using standard data management methodologies. With applications across sectors and fields of study, the implementation and possible uses of big data are limitless. The Handbook of Research on Big Data Management and Applications explores emerging research on the ever-growing field of big data and facilitates further knowledge development on methods for handling and interpreting large data sets. Providing multi-disciplinary perspectives fueled by international research, this publication is designed for use by data analysts, IT professionals, researchers, and graduate-level students interested in learning about the latest trends and concepts in big data.

Big Data Management, Technologies, and Applications (Hardcover, New): Wen-Chen Hu, Naima Kaabouch Big Data Management, Technologies, and Applications (Hardcover, New)
Wen-Chen Hu, Naima Kaabouch
R4,548 Discovery Miles 45 480 Ships in 18 - 22 working days

Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternative management and processing methods have to be created to handle this complex and unstructured data size. Big Data Management, Technologies, and Applications discusses the exponential growth of information size and the innovative methods for data capture, storage, sharing, and analysis for big data. With its prevalence, this collection of articles on big data methodologies and technologies are beneficial for IT workers, researchers, students, and practitioners in this timely field.

Information Retrieval and Management - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Information Retrieval and Management - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R7,380 Discovery Miles 73 800 Ships in 18 - 22 working days
Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover)
Oded Goldreich
R3,016 Discovery Miles 30 160 Ships in 18 - 22 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Contemporary Perspectives in Data Mining (Hardcover): Kenneth D. Lawrence, Ronald K. Klimberg Contemporary Perspectives in Data Mining (Hardcover)
Kenneth D. Lawrence, Ronald K. Klimberg; Edited by (editors-in-chief) Kenneth D. Lawrence, Ronald K. Klimberg
R2,620 Discovery Miles 26 200 Ships in 18 - 22 working days

The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in marketing (customer loyalty, identifying profitable customers, instore promotions, e-commerce populations); in business (teaching data mining, efficiency of the Chinese automobile industry, moderate asset allocation funds); and techniques (veterinary predictive models, data integrity in the cloud, irregular pattern detection in a mobility network and road safety modeling.)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Role of 6g Wireless Networks in AI and…
Malaya Dutta Borah, Steven A. Wright, … Hardcover R6,804 Discovery Miles 68 040
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Handbook of Mobility Data Mining, Volume…
Haoran Zhang Paperback R2,473 Discovery Miles 24 730
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,376 R1,275 Discovery Miles 12 750
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian Digital product license key R1,024 Discovery Miles 10 240
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Crypto Gold 2021 - A Beginners Guide to…
Nairobi Hardcover R1,028 R892 Discovery Miles 8 920
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730

 

Partners