![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Data is powerful. It separates leaders from laggards and it drives business disruption, transformation, and reinvention. Today's most progressive companies are using the power of data to propel their industries into new areas of innovation, specialization, and optimization. The horsepower of new tools and technologies have provided more opportunities than ever to harness, integrate, and interact with massive amounts of disparate data for business insights and value - something that will only continue in the era of the Internet of Things. And, as a new breed of tech-savvy and digitally native knowledge workers rise to the ranks of data scientist and visual analyst, the needs and demands of the people working with data are changing, too. The world of data is changing fast. And, it's becoming more visual. Visual insights are becoming increasingly dominant in information management, and with the reinvigorated role of data visualization, this imperative is a driving force to creating a visual culture of data discovery. The traditional standards of data visualizations are making way for richer, more robust and more advanced visualizations and new ways of seeing and interacting with data. However, while data visualization is a critical tool to exploring and understanding bigger and more diverse and dynamic data, by understanding and embracing our human hardwiring for visual communication and storytelling and properly incorporating key design principles and evolving best practices, we take the next step forward to transform data visualizations from tools into unique visual information assets.
The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are arguably the most notable. Structured Search paradigm connects them via a fundamental concept of key-objects evolving out of keywords as the units of search. The key-object data model and KeySQL revamp the data independence principle making it applicable for Big Data and complement NoSQL with full-blown structured querying functionality. The ultimate goal is extracting Big Information from the Big Data. As a Big Data Consultant, Mikhail Gilula combines academic background with 20 years of industry experience in the database and data warehousing technologies working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and PayPal, among others. He has authored three books, including The Set Model for Database and Information Systems and holds four US Patents in Structured Search and Data Integration.
INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.
MESH ist ein mathematisches Video ber vielfl chige Netzwerke und ihre Rolle in der Geometrie, der Numerik und der Computergraphik. Der unter Anwendung der neuesten Technologie vollst ndig computergenierte Film spannt einen Bogen von der antiken griechischen Mathematik zum Gebiet der heutigen geometrischen Modellierung. MESH hat zahlreiche wissenschaftliche Preise weltweit gewonnen. Die Autoren sind Konrad Polthier, ein Professor der Mathematik, und Beau Janzen, ein professioneller Filmdirektor. Der Film ist ein ausgezeichnetes Lehrmittel f r Kurse in Geometrie, Visualisierung, wissenschaftlichem Rechnen und geometrischer Modellierung an Universit ten, Zentren f r wissenschaftliches Rechnen, kann jedoch auch an Schulen genutzt werden.
Analyzing data sets has continued to be an invaluable application for numerous industries. By combining different algorithms, technologies, and systems used to extract information from data and solve complex problems, various sectors have reached new heights and have changed our world for the better. The Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics is a collection of innovative research on the methods and applications of data analytics. While highlighting topics including artificial intelligence, data security, and information systems, this book is ideally designed for researchers, data analysts, data scientists, healthcare administrators, executives, managers, engineers, IT consultants, academicians, and students interested in the potential of data application technologies.
Research in the domains of learning analytics and educational data mining has prototyped an approach where methodologies from data science and machine learning are used to gain insights into the learning process by using large amounts of data. As many training and academic institutions are maturing in their data-driven decision making, useful, scalable, and interesting trends are emerging. Organizations can benefit from sharing information on those efforts. Applying Data Science and Learning Analytics Throughout a Learner's Lifespan examines novel and emerging applications of data science and sister disciplines for gaining insights from data to inform interventions into learners' journeys and interactions with academic institutions. Data is collected at various times and places throughout a learner's lifecycle, and the learners and the institution should benefit from the insights and knowledge gained from this data. Covering topics such as learning analytics dashboards, text network analysis, and employment recruitment, this book is an indispensable resource for educators, computer scientists, faculty of higher education, government officials, educational administration, students of higher education, pre-service teachers, business professionals, researchers, and academicians.
CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.
Have you ever looked at your Library's key performance indicators and said to yourself "so what!"? Have you found yourself making decisions in a void due to the lack of useful and easily accessible operational data? Have you ever worried that you are being left behind with the emergence of data analytics? Do you feel there are important stories in your operational data that need to be told, but you have no idea how to find these stories? If you answered yes to any of these questions, then this book is for you. How Libraries Should Manage Data provides detailed instructions on how to transform your operational data from a fog of disconnected, unreliable, and inaccessible information - into an exemplar of best practice data management. Like the human brain, most people are only using a very small fraction of the true potential of Excel. Learn how to tap into a greater proportion of Excel's hidden power, and in the process transform your operational data into actionable business intelligence.
Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternative management and processing methods have to be created to handle this complex and unstructured data size. Big Data Management, Technologies, and Applications discusses the exponential growth of information size and the innovative methods for data capture, storage, sharing, and analysis for big data. With its prevalence, this collection of articles on big data methodologies and technologies are beneficial for IT workers, researchers, students, and practitioners in this timely field.
High-performance computing (HPC) describes the use of connected computing units to perform complex tasks. It relies on parallelization techniques and algorithms to synchronize these disparate units in order to perform faster than a single processor could, alone. Used in industries from medicine and research to military and higher education, this method of computing allows for users to complete complex data-intensive tasks. This field has undergone many changes over the past decade, and will continue to grow in popularity in the coming years. Innovative Research Applications in Next-Generation High Performance Computing aims to address the future challenges, advances, and applications of HPC and related technologies. As the need for such processors increases, so does the importance of developing new ways to optimize the performance of these supercomputers. This timely publication provides comprehensive information for researchers, students in ICT, program developers, military and government organizations, and business professionals.
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Next-Generation Information Retrieval and Knowledge Resources Management is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as knowledge discovery, spatial indexing, and data mining, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.
Data Mining for Bioinformatics Applications provides valuable information on the data mining methods have been widely used for solving real bioinformatics problems, including problem definition, data collection, data preprocessing, modeling, and validation. The text uses an example-based method to illustrate how to apply data mining techniques to solve real bioinformatics problems, containing 45 bioinformatics problems that have been investigated in recent research. For each example, the entire data mining process is described, ranging from data preprocessing to modeling and result validation.
Internet usage has become a normal and essential aspect of everyday life. Due to the immense amount of information available on the web, it has become obligatory to find ways to sift through and categorize the overload of data while removing redundant material. Collaborative Filtering Using Data Mining and Analysis evaluates the latest patterns and trending topics in the utilization of data mining tools and filtering practices. Featuring emergent research and optimization techniques in the areas of opinion mining, text mining, and sentiment analysis, as well as their various applications, this book is an essential reference source for researchers and engineers interested in collaborative filtering.
"Big data" has become a commonly used term to describe large-scale and complex data sets which are difficult to manage and analyze using standard data management methodologies. With applications across sectors and fields of study, the implementation and possible uses of big data are limitless. The Handbook of Research on Big Data Management and Applications explores emerging research on the ever-growing field of big data and facilitates further knowledge development on methods for handling and interpreting large data sets. Providing multi-disciplinary perspectives fueled by international research, this publication is designed for use by data analysts, IT professionals, researchers, and graduate-level students interested in learning about the latest trends and concepts in big data.
Multimedia technologies are becoming more sophisticated, enabling
the Internet to accommodate a rapidly growing audience with a full
range of services and efficient delivery methods. Although the
Internet now puts communication, education, commerce and
socialization at our finger tips, its rapid growth has raised some
weighty security concerns with respect to multimedia content. The
owners of this content face enormous challenges in safeguarding
their intellectual property, while still exploiting the Internet as
an important resource for commerce.
Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.
"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media
and get an overview of the leading vendors in a crowded space of BI
applications. By the end of this book, you will be well prepared
for your organization s next social data analytics project.
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. "Information Hiding in Speech Signals for Secure Communication" provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication
system, including applications to various network security states.
Readers will find information hiding algorithms and techniques
(embedding and extracting) that are capable of withstanding the
advanced forms of attack. The book presents concepts and
applications for all of the most widely used speech coding
standards, including G.711, G.721, G.728, G.729 and GSM, along with
corresponding hiding and extraction algorithms. Readers will also
learn how to use a speech covert communication system over an IP
network as well as a speech secure communication system applied in
PSTN.
With at least 40% new or updated content since the last edition, "Clinical Decision Support," 2nd Edition explores the crucial new motivating factors poised to accelerate Clinical Decision Support (CDS) adoption. This book is mostly focused on the US perspective because of initiatives driving EHR adoption, the articulation of 'meaningful use', and new policy attention in process including the Office of the National Coordinator for Health Information Technology (ONC) and the Center for Medicare and Medicaid Services (CMS). A few chapters focus on the broader international perspective. "Clinical Decision Support," 2nd Edition explores the technology, sources of knowledge, evolution of successful forms of CDS, and organizational and policy perspectives surrounding CDS. Exploring a roadmap for CDS, with all its efficacy benefits
including reduced errors, improved quality, and cost savings, as
well as the still substantial roadblocks needed to be overcome by
policy-makers, clinicians, and clinical informatics experts, the
field is poised anew on the brink of broad adoption. "Clinical
Decision Support," 2nd Edition provides an updated and pragmatic
view of the methodological processes and implementation
considerations. This book also considers advanced technologies and
architectures, standards, and cooperative activities needed on a
societal basis for truly large-scale adoption.
"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and
identifies and discusses the temporal functionality still missing
from SQL. |
You may like...
Agent-Based Modeling and Network…
Akira Namatame, Shu-Heng Chen
Hardcover
R2,970
Discovery Miles 29 700
Lattice Rules - Numerical Integration…
Josef Dick, Peter Kritzer, …
Hardcover
R4,119
Discovery Miles 41 190
A Journey Through Discrete Mathematics…
Martin Loebl, Jaroslav Nesetril, …
Hardcover
R4,413
Discovery Miles 44 130
Multi-Objective Optimization…
Jyotsna K Mandal, Somnath Mukhopadhyay, …
Hardcover
R4,277
Discovery Miles 42 770
Parallelism in Matrix Computations
Efstratios Gallopoulos, Bernard Philippe, …
Hardcover
R3,621
Discovery Miles 36 210
Engineering Computation of Structures…
Maria Augusta Neto, Ana Amaro, …
Hardcover
R4,399
Discovery Miles 43 990
Cohort Intelligence: A Socio-inspired…
Anand Jayant Kulkarni, Ganesh Krishnasamy, …
Hardcover
R3,204
Discovery Miles 32 040
Compressed Sensing & Sparse Filtering
Avishy Y. Carmi, Lyudmila Mihaylova, …
Hardcover
|