![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.
"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media
and get an overview of the leading vendors in a crowded space of BI
applications. By the end of this book, you will be well prepared
for your organization s next social data analytics project.
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. "Information Hiding in Speech Signals for Secure Communication" provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication
system, including applications to various network security states.
Readers will find information hiding algorithms and techniques
(embedding and extracting) that are capable of withstanding the
advanced forms of attack. The book presents concepts and
applications for all of the most widely used speech coding
standards, including G.711, G.721, G.728, G.729 and GSM, along with
corresponding hiding and extraction algorithms. Readers will also
learn how to use a speech covert communication system over an IP
network as well as a speech secure communication system applied in
PSTN.
With at least 40% new or updated content since the last edition, "Clinical Decision Support," 2nd Edition explores the crucial new motivating factors poised to accelerate Clinical Decision Support (CDS) adoption. This book is mostly focused on the US perspective because of initiatives driving EHR adoption, the articulation of 'meaningful use', and new policy attention in process including the Office of the National Coordinator for Health Information Technology (ONC) and the Center for Medicare and Medicaid Services (CMS). A few chapters focus on the broader international perspective. "Clinical Decision Support," 2nd Edition explores the technology, sources of knowledge, evolution of successful forms of CDS, and organizational and policy perspectives surrounding CDS. Exploring a roadmap for CDS, with all its efficacy benefits
including reduced errors, improved quality, and cost savings, as
well as the still substantial roadblocks needed to be overcome by
policy-makers, clinicians, and clinical informatics experts, the
field is poised anew on the brink of broad adoption. "Clinical
Decision Support," 2nd Edition provides an updated and pragmatic
view of the methodological processes and implementation
considerations. This book also considers advanced technologies and
architectures, standards, and cooperative activities needed on a
societal basis for truly large-scale adoption.
"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and
identifies and discusses the temporal functionality still missing
from SQL.
Method engineering is a very young field. Generally, method engineering can be considered from engineering of an entire methodology for information systems development to engineering of modeling techniques according to project requirements. Computer aided method engineering is about generation and use of information systems design techniques according to user needs. Some times such environments are called generic tools or MetaCASE. Computer-Aided Method Engineering: Designing Case Repositories for the 21st Century presents a contribution on a methodology and architecture of a CASE repository, forwarding a theory that will bring about the component based development into CASE tool design and development covering a repository construction principle for the 21st century.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in marketing (customer loyalty, identifying profitable customers, instore promotions, e-commerce populations); in business (teaching data mining, efficiency of the Chinese automobile industry, moderate asset allocation funds); and techniques (veterinary predictive models, data integrity in the cloud, irregular pattern detection in a mobility network and road safety modeling.)
"Information Management: Gaining a Competitive Advantage with Data" is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. "Information Management" will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a
quick and useful resource. Either way, this book will enable you to
master all of the possibilities for data or the broadest view
across the enterprise.
Whether you are brand new to data mining or working on your tenth predictive analytics project, "Commercial Data Mining" will be there for you as an accessible reference outlining the entire process and related themes. In this book, you'll learn that your organization does not need a huge volume of data or a Fortune 500 budget to generate business using existing information assets. Expert author David Nettleton guides you through the process from beginning to end and covers everything from business objectives to data sources, and selection to analysis and predictive modeling. "Commercial Data Mining" includes case studies and practical
examples from Nettleton's more than 20 years of commercial
experience. Real-world cases covering customer loyalty,
cross-selling, and audience prediction in industries including
insurance, banking, and media illustrate the concepts and
techniques explained throughout the book.
Online survey research suites offer a vast array of capabilities, supporting the presentation of virtually every type of digital data - text, imagery, audio, video, and multimedia forms. With some researcher sophistication, these online survey research suites can enable a wide range of quantitative, qualitative, and mixed methods research. Online Survey Design and Data Analytics: Emerging Research and Opportunities is a critical scholarly resource that explores the utilization of online platforms for setting up surveys to achieve a specific result, eliciting data in in-depth ways and applying creative analytics methods to online survey data. Highlighting topics such as coding, education-based analysis, and online Delphi studies, this publication is ideal for researchers, professionals, academicians, data analysts, IT consultants, and students.
"Implementing Analytics" demystifies the concept, technology and
application of analytics and breaks its implementation down to
repeatable and manageable steps, making it possible for widespread
adoption across all functions of an organization. "Implementing
Analytics "simplifies and helps democratize a very specialized
discipline to foster business efficiency and innovation without
investing in multi-million dollar technology and manpower. A
technology agnostic methodology that breaks down complex tasks like
model design and tuning and emphasizes business decisions rather
than the technology behind analytics. Simplifies the understanding of analytics from a technical and functional perspective and shows a wide array of problems that can be tackled using existing technology Provides a detailed step by step approach to identify opportunities, extract requirements, design variables and build and test models. It further explains the business decision strategies to use analytics models and provides an overview for governance and tuning Helps formalize analytics projects from staffing, technology and implementation perspectives Emphasizes machine learning and data mining over statistics and shows how the role of a Data Scientist can be broken down and still deliver the value by building a robust development process
This book is the best way to make the leap from SQL-92 to SQL:
1999, but it is much more than just a simple bridge between the
two. The latest from celebrated SQL experts Jim Melton and Alan
Simon, "SQL: 1999" is a comprehensive, eminently practical account
of SQL's latest incarnation and a potent distillation of the
details required to put it to work. Written to accommodate both
novice and experienced SQL users, "SQL: 1999" focuses on the
language's capabilities, from the basic to the advanced, and the
way that real applications take advantage of them. Throughout, the
authors illustrate features and techniques with clear and often
entertaining references to their own custom database, which can be
downloaded from the companion Web site.
Blockchain technology presents numerous advantages that include increased transparency, reduced transaction costs, faster transaction settlement, automation of information, increased traceability, improved customer experience, improved digital identity, better cyber security, and user-controlled networks. These potential applications are widespread and diverse including funds transfer, smart contracts, e-voting, efficient supply chain, and more in nearly every sector of society including finance, healthcare, law, trade, real estate, and other important areas. However, there are challenges and limitations that exist such as high energy consumption, limited scalability, complexity, security, network size, lack of regulations, and other critical issues. Nevertheless, blockchain is an attractive technology and has much to offer to the modern-day industry. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector investigates blockchain technology's adoption and effectiveness in multiple industries and for the internet of things (IoT)-based applications, presents use cases from industrial and financial sectors as well as from other transaction-based services, and fills a gap in this respect by extending the existing body of knowledge in the suggested field. While highlighting topics such as cybersecurity, use cases, and models for blockchain implementation, this book is ideal for business managers, financial accountants, practitioners, researchers, academicians, and students interested in blockchain technology's role and implementation in IoT and the financial sector.
Websites are a central part of today's business world; however, with the vast amount of information that constantly changes and the frequency of required updates, this can come at a high cost to modern businesses. Web Data Mining and the Development of Knowledge-Based Decision Support Systems is a key reference source on decision support systems in view of end user accessibility and identifies methods for extraction and analysis of useful information from web documents. Featuring extensive coverage across a range of relevant perspectives and topics, such as semantic web, machine learning, and expert systems, this book is ideally designed for web developers, internet users, online application developers, researchers, and faculty.
The concept of digital risk, which has become ubiquitous in the media, sustains a number of myths and beliefs about the digital world. This book explores the opposite view of these ideologies by focusing on digital risks as perceived by actors in their respective contexts. Perceptions and Analysis of Digital Risks identifies the different types of risks that concern actors and actually impact their daily lives, within education or various socio-professional environments. It provides an analysis of the strategies used by the latter to deal with these risks as they conduct their activities; thus making it possible to characterize the digital cultures and, more broadly, the informational cultures at work. This book offers many avenues for action in terms of educating the younger generations, training teachers and leaders, and mediating risks.
Churn prediction, recognition, and mitigation have become essential topics in various industries. As a means for forecasting and manageing risk, further research in this field can greatly assist companies in making informed decisions based on future possible scenarios. Developing Churn Models Using Data Mining Techniques and Social Network Analysis provides an in-depth analysis of attrition modeling relevant to business planning and management. Through its insightful and detailed explanation of best practices, tools, and theory surrounding churn prediction and the integration of analytics tools, this publication is especially relevant to managers, data specialists, business analysts, academicians, and upper-level students.
|
You may like...
Machine Learning, Big Data, and IoT for…
Pardeep Kumar, Yugal Kumar, …
Paperback
R2,657
Discovery Miles 26 570
Machine Learning Paradigms - Advances in…
George A. Tsihrintzis, Dionisios N. Sotiropoulos, …
Hardcover
R4,743
Discovery Miles 47 430
Machine Learning Applications in…
Goutam Kumar Bose, Pritam Pain
Hardcover
R5,327
Discovery Miles 53 270
Machine Learning and Biometrics
Jucheng Yang, Dong Sun Park, …
Hardcover
R3,065
Discovery Miles 30 650
Tempete Sous Un Crane: Compagnie Air De…
Celine Ottria, Compagnie Air de Lune, …
DVD
R498
Discovery Miles 4 980
|