![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
This book addresses the pertinent issues that will need to be considered by those interested in physical security problems of the future. Specifically, it examines how changes in the accessibility of technology - data, hardware, software - are likely to affect both threat and mitigation considerations for Chemical, Biological, Radiological and Explosive (CBRE) scenarios and how social science can inform us of the human aspects of each. The trend towards an ever more socio-technical society and infrastructures - encapsulated by concepts such as 'smart cities' - is drawn out as a key motivation for adopting more holistic risk approaches to such security problems, than is currently the case.
The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network. Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing. The Ransomware Threat Landscape This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation. Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face. From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: Introduction About ransomware Basic measures An anti-ransomware The control framework Risk management Controls Maturity Basic controls Additional controls for larger organisations Advanced controls Don't delay - start protecting your organisation from ransomware and buy this book today!
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book presents the collection of the accepted research papers presented in the 1st 'International Conference on Computational Intelligence and Sustainable Technologies (ICoCIST-2021)'. This edited book contains the articles related to the themes on artificial intelligence in machine learning, big data analysis, soft computing techniques, pattern recognitions, sustainable infrastructural development, sustainable grid computing and innovative technology for societal development, renewable energy, and innovations in Internet of Things (IoT).
This book presents the potential use and implementation of intelligent techniques in decision making processes involved in organizations and companies. It provides a thorough analysis of decisions, reviewing the classical decision theory, and describing usual methods for modeling the decision process. It describes the chronological evolution of Decision Support Systems (DSS) from early Management Information Systems until the appearance of Intelligent Decision Support Systems (IDSS). It explains the most commonly used intelligent techniques, both data-driven and model-driven, and illustrates the use of knowledge models in Decision Support through case studies. The author pays special attention to the whole Data Science process, which provides intelligent data-driven models in IDSS. The book describes main uncertainty models used in Artificial Intelligence to model inexactness; covers recommender systems; and reviews available development tools for inducing data-driven models, for using model-driven methods and for aiding the development of Intelligent Decision Support Systems
This second volume of the book series shows R-calculus is a combination of one monotonic tableau proof system and one non-monotonic one. The R-calculus is a Gentzen-type deduction system which is non-monotonic, and is a concrete belief revision operator which is proved to satisfy the AGM postulates and the DP postulates. It discusses the algebraical and logical properties of tableau proof systems and R-calculi in many-valued logics. This book offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners in the field of logic. Also it is very useful for all those who are interested in data, digitization and correctness and consistency of information, in modal logics, non monotonic logics, decidable/undecidable logics, logic programming, description logics, default logics and semantic inheritance networks.
This book presents the proceedings of the 9th Asian South Pacific Association of Sport Psychology International Congress (ASPASP) 2022, Kuching, Malaysia, which entails the different sporting innovation themes, namely, Applied Sport and Social Psychology, Health and Exercise, Motor Control and Learning, Counselling and Clinical Psychology, Biomechanics, Data Mining and Machine Learning in Sports amongst others. It presents the state-of-the-art technological advancements towards the aforesaid themes and provides a platform to shape the future direction of sport science, specifically in the field sports and exercise psychology. ​
This book gathers extended versions of papers presented at DoSIER 2021 (the 2021 Third Doctoral Symposium on Intelligence Enabled Research, held at Cooch Behar Government Engineering College, West Bengal, India, during November 12-13, 2021). The papers address the rapidly expanding research area of computational intelligence, which, no longer limited to specific computational fields, has since made inroads in signal processing, smart manufacturing, predictive control, robot navigation, smart cities, and sensor design, to name but a few. Presenting chapters written by experts active in these areas, the book offers a valuable reference guide for researchers and industrial practitioners alike and inspires future studies.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!
This book aims to highlight the latest achievements in the use of AI and multimodal artificial intelligence in biomedicine and healthcare. Multimodal AI is a relatively new concept in AI, in which different types of data (e.g. text, image, video, audio, and numerical data) are collected, integrated, and processed through a series of intelligence processing algorithms to improve performance. The edited volume contains selected papers presented at the 2022 Health Intelligence workshop and the associated Data Hackathon/Challenge, co-located with the Thirty-Sixth Association for the Advancement of Artificial Intelligence (AAAI) conference, and presents an overview of the issues, challenges, and potentials in the field, along with new research results. This book provides information for researchers, students, industry professionals, clinicians, and public health agencies interested in the applications of AI and Multimodal AI in public health and medicine.
This book focuses on the changes which big data brings to human's society and personal thinking models. The author uses the concept of "data civilization" to reveal that we have entered a brand-new era on civilization level, which could be found and understood from three levels: human data civilization, commercial data civilization, and personal data civilization. There is no doubt data civilization will inevitably make a profound influence on the subversion and reconstruction of human beings including business, society, and thinking models. The book presents a unique perspective to understand the world which is dominated by data more and more.
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: * To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; * To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; * To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.
Our society keeps growing with a large number of complicated
machines and systems, while we are spending our diverse lives. The
number of aged people has been increasing in the society. It is
more likely than ever that we are involved in dangers, accidents,
crimes, and disasters. Securing and supporting our daily life,
building reliable infrastructures against large scale disasters,
and preventing unexpected human errors are crucial issues in our
highly developed complex society.
Education and Technology for a Better World was the main theme for WCCE 2009. The conference highlights and explores different perspectives of this theme, covering all levels of formal education as well as informal learning and societal aspects of education. The conference was open to everyone involved in education and training. Additionally players from technological, societal, business and political fields outside education were invited to make relevant contributions within the theme: Education and Technology for a Better World. For several years the WCCE (World Conference on Computers in Education) has brought benefits to the fields of computer science and computers and education as well as to their communities. The contributions at WCCE include research projects and good practice presented in different formats from full papers to posters, demonstrations, panels, workshops and symposiums. The focus is not only on presentations of accepted contributions but also on discussions and input from all participants. The main goal of these conferences is to provide a forum for the discussion of ideas in all areas of computer science and human learning. They create a unique environment in which researchers and practitioners in the fields of computer science and human learning can interact, exchanging theories, experiments, techniques, applications and evaluations of initiatives supporting new developments that are potentially relevant for the development of these fields. They intend to serve as reference guidelines for the research community.
Digital Image Processing with C++ presents the theory of digital image processing, and implementations of algorithms using a dedicated library. Processing a digital image means transforming its content (denoising, stylizing, etc.), or extracting information to solve a given problem (object recognition, measurement, motion estimation, etc.). This book presents the mathematical theories underlying digital image processing, as well as their practical implementation through examples of algorithms implemented in the C++ language, using the free and easy-to-use CImg library. Chapters cover in a broad way the field of digital image processing and proposes practical and functional implementations of each method theoretically described. The main topics covered include filtering in spatial and frequency domains, mathematical morphology, feature extraction and applications to segmentation, motion estimation, multispectral image processing and 3D visualization. Students or developers wishing to discover or specialize in this discipline, teachers and researchers wishing to quickly prototype new algorithms, or develop courses, will all find in this book material to discover image processing or deepen their knowledge in this field.
This monograph offers an original broad and very diverse exploration of the seriation domain in data analysis, together with building a specific relation to clustering.Relative to a data table crossing a set of objects and a set of descriptive attributes, the search for orders which correspond respectively to these two sets is formalized mathematically and statistically. State-of-the-art methods are created and compared with classical methods and a thorough understanding of the mutual relationships between these methods is clearly expressed. The authors distinguish two families of methods: Geometric representation methods Algorithmic and Combinatorial methods Original and accurate methods are provided in the framework for both families. Their basis and comparison is made on both theoretical and experimental levels. The experimental analysis is very varied and very comprehensive. Seriation in Combinatorial and Statistical Data Analysis has a unique character in the literature falling within the fields of Data Analysis, Data Mining and Knowledge Discovery. It will be a valuable resource for students and researchers in the latter fields.
This book provides a collection of recent research works addressing theoretical issues on improving the learning process and the generalization of GANs as well as state-of-the-art applications of GANs to various domains of real life. Adversarial learning fascinates the attention of machine learning communities across the world in recent years. Generative adversarial networks (GANs), as the main method of adversarial learning, achieve great success and popularity by exploiting a minimax learning concept, in which two networks compete with each other during the learning process. Their key capability is to generate new data and replicate available data distributions, which are needed in many practical applications, particularly in computer vision and signal processing. The book is intended for academics, practitioners, and research students in artificial intelligence looking to stay up to date with the latest advancements on GANs' theoretical developments and their applications.
Artificial Intelligence (AI), when incorporated with machine learning and deep learning algorithms, has a wide variety of applications today. This book focuses on the implementation of various elementary and advanced approaches in AI that can be used in various domains to solve real-time decision-making problems. The book focuses on concepts and techniques used to run tasks in an automated manner. It discusses computational intelligence in the detection and diagnosis of clinical and biomedical images, covers the automation of a system through machine learning and deep learning approaches, presents data analytics and mining for decision-support applications, and includes case-based reasoning, natural language processing, computer vision, and AI approaches in real-time applications. Academic scientists, researchers, and students in the various domains of computer science engineering, electronics and communication engineering, and information technology, as well as industrial engineers, biomedical engineers, and management, will find this book useful. By the end of this book, you will understand the fundamentals of AI. Various case studies will develop your adaptive thinking to solve real-time AI problems. Features Includes AI-based decision-making approaches Discusses computational intelligence in the detection and diagnosis of clinical and biomedical images Covers automation of systems through machine learning and deep learning approaches and its implications to the real world Presents data analytics and mining for decision-support applications Offers case-based reasoning
Safety-Critical Real-Time Systems brings together in one place important contributions and up-to-date research results in this fast moving area. Safety-Critical Real-Time Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Semantics and ontologies offer an extension to traditional information systems in which information is given well-defined meaning, enabling computers and people to work in cooperation. With expanding uses and integrations of semantics and ontologies, research in Semantic Web engineering has grown immensely. Semantic Web Engineering in the Knowledge Society brings together contributions from researchers and scientists from both industry and academia and representatives from different communities for the understanding and exploration of the theories, tools, and applications of semantics and ontologies. This authoritative reference serves as the platform for exchange of both practical technologies and far reaching implications, offering academicians and practitioners a compendium of knowledge in Semantic Web engineering.
Fuzzy cognitive maps (FCMs) have gained popularity in the scientific community due to their capabilities in modeling and decision making for complex problems.This book presents a novel algorithm called glassoFCM to enable automatic learning of FCM models from data. Specifically, glassoFCM is a combination of two methods, glasso (a technique originated from machine learning) for data modeling and FCM simulation for decision making. The book outlines that glassoFCM elaborates simple, accurate, and more stable models that are easy to interpret and offer meaningful decisions. The research results presented are based on an investigation related to a real-world business intelligence problem to evaluate characteristics that influence employee work readiness.Finally, this book provides readers with a step-by-step guide of the 'fcm' package to execute and visualize their policies and decisions through the FCM simulation process.
This book is ideal for a one- or two-term course in database management or database design in an undergraduate or graduate level course. With its comprehensive coverage, this book can also be used as a reference for IT professionals. This best-selling text introduces the theory behind databases in a concise yet comprehensive manner, providing database design methodology that can be used by both technical and non-technical readers. The methodology for relational Database Management Systems is presented in simple, step-by-step instructions in conjunction with a realistic worked example using three explicit phases-conceptual, logical, and physical database design. Teaching and Learning Experience This program presents a better teaching and learning experience-for you and your students. It provides: *Database Design Methodology that can be Used by Both Technical and Non-technical Readers *A Comprehensive Introduction to the Theory behind Databases *A Clear Presentation that Supports Learning
Most of the papers in this volume were first presented at the Workshop on Cross-Linguistic Information Retrieval that was held August 22, 1996 dur ing the SIGIR'96 Conference. Alan Smeaton of Dublin University and Paraic Sheridan of the ETH, Zurich, were the two other members of the Scientific Committee for this workshop. SIGIR is the Association for Computing Ma chinery (ACM) Special Interest Group on Information Retrieval, and they have held conferences yearly since 1977. Three additional papers have been added: Chapter 4 Distributed Cross-Lingual Information retrieval describes the EMIR retrieval system, one of the first general cross-language systems to be implemented and evaluated; Chapter 6 Mapping Vocabularies Using Latent Semantic Indexing, which originally appeared as a technical report in the Lab oratory for Computational Linguistics at Carnegie Mellon University in 1991, is included here because it was one of the earliest, though hard-to-find, publi cations showing the application of Latent Semantic Indexing to the problem of cross-language retrieval; and Chapter 10 A Weighted Boolean Model for Cross Language Text Retrieval describes a recent approach to solving the translation term weighting problem, specific to Cross-Language Information Retrieval. Gregory Grefenstette CONTRIBUTORS Lisa Ballesteros David Hull W, Bruce Croft Gregory Grefenstette Center for Intelligent Xerox Research Centre Europe Information Retrieval Grenoble Laboratory Computer Science Department University of Massachusetts Thomas K. Landauer Department of Psychology Mark W. Davis and Institute of Cognitive Science Computing Research Lab University of Colorado, Boulder New Mexico State University Michael L. Littman Bonnie J." |
You may like...
The Nuclear Receptor FactsBook
Vincent Laudet, Hinrich Gronemeyer
Paperback
R1,962
Discovery Miles 19 620
New Research on the Voynich Manuscript…
National Security Agency
Hardcover
R539
Discovery Miles 5 390
|