![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Multimedia and its rich semantics are profligate in today s digital environment. Databases and content management systems serve as essential tools to ensure that the endless supply of multimedia content are indexed and remain accessible to end users. Methods and Innovations for Multimedia Database Content Management highlights original research on new theories, algorithms, technologies, system design, and implementation in multimedia data engineering and management with an emphasis on automatic indexing, tagging, high-order ranking, and rule mining. This book is an ideal resource for university researchers, scientists, industry professionals, software engineers and graduate students.
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.
Uncovering and analyzing data associated with the current business environment is essential in maintaining a competitive edge. As such, making informed decisions based on this data is crucial to managers across industries. Integration of Data Mining in Business Intelligence Systems investigates the incorporation of data mining into business technologies used in the decision making process. Emphasizing cutting-edge research and relevant concepts in data discovery and analysis, this book is a comprehensive reference source for policymakers, academicians, researchers, students, technology developers, and professionals interested in the application of data mining techniques and practices in business information systems.
Managing Time in Relational Databases: How to Design, Update and Query Temporal Data introduces basic concepts that will enable businesses to develop their own framework for managing temporal data. It discusses the management of uni-temporal and bi-temporal data in relational databases, so that they can be seamlessly accessed together with current data; the encapsulation of temporal data structures and processes; ways to implement temporal data management as an enterprise solution; and the internalization of pipeline datasets. The book is organized into three parts. Part 1 traces the history of temporal data management and presents a taxonomy of bi-temporal data management methods. Part 2 provides an introduction to Asserted Versioning, covering the origins of Asserted Versioning; core concepts of Asserted Versioning; the schema common to all asserted version tables, as well as the various diagrams and notations used in the rest of the book; and how the basic scenario works when the target of that activity is an asserted version table. Part 3 deals with designing, maintaining, and querying asserted version databases. It discusses the design of Asserted Versioning databases; temporal transactions; deferred assertions and other pipeline datasets; Allen relationships; and optimizing Asserted Versioning databases.
In the literature of information science, a number of studies have been carried out attempting to model cognitive, affective, behavioral, and contextual factors associated with human information seeking and retrieval. On the other hand, only a few studies have addressed the exploration of creative thinking in music, focusing on understanding and describing individuals' information seeking behavior during the creative process. Trends in Music Information Seeking, Behavior, and Retrieval for Creativity connects theoretical concepts in information seeking and behavior to the music creative process. This publication presents new research, case studies, surveys, and theories related to various aspects of information retrieval and the information seeking behavior of diverse scholarly and professional music communities. Music professionals, theorists, researchers, and students will find this publication an essential resource for their professional and research needs.
Conventional computational methods, and even the latest soft computing paradigms, often fall short in their ability to offer solutions to many real-world problems due to uncertainty, imprecision, and circumstantial data. Hybrid intelligent computing is a paradigm that addresses these issues to a considerable extent. The Handbook of Research on Advanced Research on Hybrid Intelligent Techniques and Applications highlights the latest research on various issues relating to the hybridization of artificial intelligence, practical applications, and best methods for implementation. Focusing on key interdisciplinary computational intelligence research dealing with soft computing techniques, pattern mining, data analysis, and computer vision, this book is relevant to the research needs of academics, IT specialists, and graduate-level students.
New Methods of Market Research and Analysis prepares readers for the new reality posed by big data and marketing analytics. While connecting to traditional research approaches such as surveys and focus groups, this book shows how new technologies and new analytical capabilities are rapidly changing the way marketers obtain and process their information. In particular, the prevalence of big data systems always monitoring key performance indicators, trends toward more research using observation or observation and communication together, new technologies such as mobile, apps, geo-locators, and others, as well as the deep analytics allowed by cheap data processing and storage are all covered and placed in context. Scott Erickson goes beyond the buzzwords to provide relevant explanations of the meaning and impact of both big data and analytics, placing them in context with traditional marketing research. His engaging subject matter focuses on the practical aspects of big data concepts, precisely defining and illustrating key concepts and providing illuminating real world examples. This approachable style enables marketers to understand what data scientists are doing with big data systems and analytics, giving them a taste of the capabilities of contemporary statistical software and its practical applications. This book can be used as a supplement to a traditional marketing research text or on its own. It will serve as a key reference for graduate students and advanced undergraduates in marketing research, marketing analytics, or business intelligence courses as well as marketing professionals looking to stay up to date with current trends and have them explained in a context they understand.
The body of research in all aspects of Semantic Web development, design, and application continues to grow alongside new trends in the information systems community. Semantic-Enabled Advancements on the Web: Applications Across Industries reviews current and future trends in Semantic Web research with the aim of making existing and potential applications more accessible to a broader community of academics, practitioners, and industry professionals. Covering topics including recommendation systems, semantic search, and ontologies, this reference is a valuable contribution to the existing literature in this discipline.
The long-standing debate on public vs. private healthcare systems has forced an examination of these organisations, in particular whether these approaches play corresponding or conflicting roles in service to global citizens. Healthcare Management and Economics: Perspectives on Public and Private Administration discusses public and private healthcare organisations by gathering perspectives on the differences in service, management, delivery, and efficiency. Highlighting the impact of citizens and information technology in these healthcare processes, this book is a vital collection of research for practitioners, academics, and scholars in the healthcare management field.
Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis of databases. Containing over 30 chapters from authors across the globe, these selected readings in areas such as data warehousing, information retrieval, and knowledge discovery depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Big data consists of data sets that are too large and complex for traditional data processing and data management applications. Therefore, to obtain the valuable information within the data, one must use a variety of innovative analytical methods, such as web analytics, machine learning, and network analytics. As the study of big data becomes more popular, there is an urgent demand for studies on high-level computational intelligence and computing services for analyzing this significant area of information science. Big Data Analytics for Sustainable Computing is a collection of innovative research that focuses on new computing and system development issues in emerging sustainable applications. Featuring coverage on a wide range of topics such as data filtering, knowledge engineering, and cognitive analytics, this publication is ideally designed for data scientists, IT specialists, computer science practitioners, computer engineers, academicians, professionals, and students seeking current research on emerging analytical techniques and data processing software.
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.""Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions"" serves as a critical source of information related to emerging issues and solutions in data mining and the influence of political and socioeconomic factors. An immense breakthrough, this essential reference provides concise coverage of emerging issues and technological solutions in data mining, and covers problems with applicable laws governing such issues.
Big data has presented a number of opportunities across industries. With these opportunities come a number of challenges associated with handling, analyzing, and storing large data sets. One solution to this challenge is cloud computing, which supports a massive storage and computation facility in order to accommodate big data processing. Managing and Processing Big Data in Cloud Computing explores the challenges of supporting big data processing and cloud-based platforms as a proposed solution. Emphasizing a number of crucial topics such as data analytics, wireless networks, mobile clouds, and machine learning, this publication meets the research needs of data analysts, IT professionals, researchers, graduate students, and educators in the areas of data science, computer programming, and IT development.
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.
Organizations that utilize data mining techniques can amass valuable information on clients habits and preferences, behavior patterns, purchase patterns, sales patterns, and stock forecasts. Ethical Data Mining Applications for Socio-Economic Development provides an overview of data mining techniques under an ethical lens, investigating developments in research and best practices, while evaluating experimental cases to identify potential ethical dilemmas in the information and communications technology sector. The cases and research in this book will benefit scientists, researchers, and practitioners working in the field of data mining, data warehousing, and database management to ensure that data obtained through web-based investigations is properly handled at all organizational levels. This book is part of the Advances in Data Mining and Database Management series collection.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security. |
You may like...
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
R1,024
Discovery Miles 10 240
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Blockchain Life - Making Sense of the…
Kary Oberbrunner, Lee Richter
Hardcover
R506
Discovery Miles 5 060
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
|