0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (59)
  • R250 - R500 (365)
  • R500+ (14,537)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Big Data: Conceptual Analysis and Applications (Hardcover, 1st ed. 2020): Michael Z. Zgurovsky, Yuriy P. Zaychenko Big Data: Conceptual Analysis and Applications (Hardcover, 1st ed. 2020)
Michael Z. Zgurovsky, Yuriy P. Zaychenko
R3,363 Discovery Miles 33 630 Ships in 18 - 22 working days

The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.

Advances in Enterprise Information Technology Security (Hardcover): Advances in Enterprise Information Technology Security (Hardcover)
R4,239 Discovery Miles 42 390 Ships in 18 - 22 working days

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud, Global Edition... Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud, Global Edition (Paperback)
Paul Deitel
R1,815 R1,474 Discovery Miles 14 740 Save R341 (19%) Ships in 5 - 10 working days

A groundbreaking, flexible approach to computer science anddata science The Deitels' Introduction to Python for ComputerScience and Data Science: Learning to Program with AI, Big Data and the Cloudoffers a unique approach to teaching introductory Python programming,appropriate for both computer-science and data-science audiences. Providing themost current coverage of topics and applications, the book is paired withextensive traditional supplements as well as Jupyter Notebooks supplements.Real-world datasets and artificial-intelligence technologies allow students towork on projects making a difference in business, industry, government andacademia. Hundreds of examples, exercises, projects (EEPs) and implementationcase studies give students an engaging, challenging and entertainingintroduction to Python programming and hands-on data science. The book's modular architecture enables instructors toconveniently adapt the text to a wide range of computer-science anddata-science courses offered to audiences drawn from many majors.Computer-science instructors can integrate as much or as little data-scienceand artificial-intelligence topics as they'd like, and data-science instructorscan integrate as much or as little Python as they'd like. The book aligns withthe latest ACM/IEEE CS-and-related computing curriculum initiatives and withthe Data Science Undergraduate Curriculum Proposal sponsored by the NationalScience Foundation.

Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover): Ricardo Perez-Castillo, Mario G.... Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover)
Ricardo Perez-Castillo, Mario G. Piattini
R4,995 Discovery Miles 49 950 Ships in 18 - 22 working days

Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.

e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed.... Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed. 2020)
Luis Teran
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

Electronic participation is an emerging and growing research area that makes use of internet solutions to enhance citizens' participation in government processes in order to provide a fair and efficient society. This book examines recommender-system technologies and voting advice applications as tools to enable electronic citizen participation during election campaigns. Further, making use of fuzzy classification, it provides an evaluation framework for eParticipation. A dynamic voting advice application developed for the 2017 Ecuador national election serves as a real-world case study to introduce readers to the practical implementation and evaluation issues. The book concludes with a comprehensive analysis of the 2017 election project based on altmetrics, Google Analytics and statistics from the case study.

Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019): Pandian Vasant, Igor Litvinchev, Jose Antonio... Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a survey on research, development, and trends in innovative computing in communications engineering and computer science. It features selected and expanded papers from the EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018), with contributions by top global researchers and practitioners in the field. The content is of relevance to computer science graduates, researchers and academicians in computer science and engineering. The authors discuss new technologies in computer science and engineering that have reduced the dimension of data coverage worldwide, reducing the gaps and coverage of domains globally. They discuss how these advances have also contributed to strength in prediction, analysis, and decision in the areas such as Technology, Management, Social Computing, Green Computing, and Telecom. Contributions show how nurturing the research in technology and computing is essential to finding the right pattern in the ocean of data. Focuses on research areas of innovative computing and its application in engineering and technology; Includes contributions from researchers in computing and engineering from around the world; Features selected and expanded papers from EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018).

Contemporary Issues in Database Design and Information Systems Development (Hardcover): Contemporary Issues in Database Design and Information Systems Development (Hardcover)
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.

Insightful Data Visualization with SAS Viya (Hardcover): Falko Schulz, Travis Murphy Insightful Data Visualization with SAS Viya (Hardcover)
Falko Schulz, Travis Murphy
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Relevant Search (Paperback): Doug Turnbull Relevant Search (Paperback)
Doug Turnbull
R1,068 R990 Discovery Miles 9 900 Save R78 (7%) Ships in 10 - 15 working days

DESCRIPTION Users expect search to be simple: They enter a few terms and expect perfectly-organized, relevant results instantly. But behind this simple user experience, complex machinery is at work. Whether using Elasticsearch, Solr, or another search technology, the solution is never one size fits all. Returning the right search results requires conveying domain knowledge and business rules in the search engine's data structures, text analytics, and results ranking capabilities. Relevant Search demystifies relevance work. Using Elasticsearch, it tells how to return engaging search results to users, helping readers understand and leverage the internals of Lucene-based search engines. The book walks through several real-world problems using a cohesive philosophy that combines text analysis, query building, and score shaping to express business ranking rules to the search engine. It outlines how to guide the engineering process by monitoring search user behavior and shifting the enterprise to a search-first culture focused on humans, not computers. It also shows how the search engine provides a deeply pluggable platform for integrating search ranking with machine learning, ontologies, personalization, domain-specific expertise, and other enriching sources. KEY FEATURES Highly relevant, concrete, hands-on guide Digs deep into search engine technology Contains essential tools, tips, and strategies for building engaging search engines AUDIENCE For readers who can code moderately complex tasks. ABOUT THE TECHNOLOGY Lucene is the underlying technology that backs both Elasticsearch and Solr. Dominant search engines are based upon Lucene and since Lucene itself is based upon the strong foundation of Information Retrieval research, the book will be applicable to almost any search technology available now or in the foreseeable future.

Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New): Jose Carlos Ramalho, Alberto... Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New)
Jose Carlos Ramalho, Alberto Simoes, Ricardo Queiros
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.

Exploring Advances in Interdisciplinary Data Mining and Analytics - New Trends (Hardcover): David Taniar, Lukman Hakim Iwan Exploring Advances in Interdisciplinary Data Mining and Analytics - New Trends (Hardcover)
David Taniar, Lukman Hakim Iwan
R4,941 Discovery Miles 49 410 Ships in 18 - 22 working days

Data mining is still a relatively young field, expanding at the rate of technology while advancing tools and techniques for gaining knowledge, finding patterns, and managing databases. Exploring Advances in Interdisciplinary Data Mining and Analytics: New Trends is an updated look at the state of technology in the field of data mining and analytics. As processor speeds, database size, network capabilities, artificial intelligence, and most fields of hardware and software continue to improve at a staggering rate of increased capability and pace, it is vital for practitioners to stay abreast of the current issues and research in the field. This volume is perfect for IT specialists, data analysts, practitioners and academics alike, offering the latest technological, analytical, ethical, and commercial perspectives on topics in data mining.

Temporal and Spatio-temporal Data Mining (Hardcover): Wynne Hsu, Mong Li Lee, Junmei Wang Temporal and Spatio-temporal Data Mining (Hardcover)
Wynne Hsu, Mong Li Lee, Junmei Wang
R2,601 Discovery Miles 26 010 Ships in 18 - 22 working days

Addresses different scenarios when finding complex relationships in spatiotemporal data by modeling them as graphs, giving readers a comprehensive synopsis on two successful partition-based algorithms designed by the authors.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover): Li Yan, Zongmin Ma Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover)
Li Yan, Zongmin Ma
R4,606 Discovery Miles 46 060 Ships in 18 - 22 working days

Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world. Advanced Database Query Systems: Techniques, Applications and Technologies focuses on technologies and methodologies of database queries, XML and metadata queries, and applications of database query systems, aiming at providing a single account of technologies and practices in advanced database query systems. This book provides the state of the art information for academics, researchers and industry practitioners who are interested in the study, use, design and development of advanced and emerging database queries with ultimate aim of building competencies for exploiting the opportunities of the data and knowledge society.

Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,189 Discovery Miles 81 890 Ships in 18 - 22 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Scrum - Mastery - The Essential Guide to Scrum and Agile Project Management (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP &... Scrum - Mastery - The Essential Guide to Scrum and Agile Project Management (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal (Hardcover)
Greg Caldwell
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
How To Recover Deleted Files - Your Step By Step Guide To Recovering Deleted Files (Hardcover): Howexpert How To Recover Deleted Files - Your Step By Step Guide To Recovering Deleted Files (Hardcover)
Howexpert
R729 Discovery Miles 7 290 Ships in 18 - 22 working days
MySQL Stored Routines - Creating Your Own Procedure and Function: A Beginner's Tutorial (Paperback): Djoni Darmawikarta MySQL Stored Routines - Creating Your Own Procedure and Function: A Beginner's Tutorial (Paperback)
Djoni Darmawikarta
R178 Discovery Miles 1 780 Ships in 10 - 15 working days
Natural Language Processing in the Real World - Text Processing, Analytics, and Classification (Paperback): Jyotika Singh Natural Language Processing in the Real World - Text Processing, Analytics, and Classification (Paperback)
Jyotika Singh
R1,597 Discovery Miles 15 970 Ships in 9 - 17 working days

a) Provides basic concepts of Natural Language Processing for getting started from scratch. b) Introduces advanced concepts for scaling, deep learning and real-world issues seen in the industry. c) Provides applications of Natural Language Processing over a diverse set of 15 industry verticals. d) Shares practical implementation including Python code, tools and techniques for a variety of Natural Language Processing applications and industrial products for a hands-on experience. e) Gives readers a sense of all there is to build successful Natural Language Processing projects: the concepts, applications, opportunities and hands-on material.

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Big Data Analytics in Traffic and Transportation Engineering - Emerging Research and Opportunities (Hardcover): Sara Moridpour,... Big Data Analytics in Traffic and Transportation Engineering - Emerging Research and Opportunities (Hardcover)
Sara Moridpour, Alireza Toran Pour, Tayebeh Saghapour
R4,097 Discovery Miles 40 970 Ships in 18 - 22 working days

Recent research reveals that socioeconomic factors of the neighborhoods where road users live and where pedestrian-vehicle crashes occur are important in determining the severity of the crashes, with the former having a greater influence. Hence, road safety countermeasures, especially those focusing on the road users, should be targeted at these high risk neighborhoods. Big Data Analytics in Traffic and Transportation Engineering: Emerging Research and Opportunities is an essential reference source that discusses access to transportation and examines vehicle-pedestrian crashes, specifically in relation to socioeconomic factors that influence them, main predictors, factors that contribute to crash severity, and the enhancement of pedestrian safety measures. Featuring research on topics such as public transport, accessibility, and spatial distribution, this book is ideally designed for policymakers, transportation engineers, road safety designers, transport planners and managers, professionals, academicians, researchers, and public administrators.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Internet-enabled Handheld Devices…
Wen-Chen Hu Hardcover R4,193 Discovery Miles 41 930
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von Paperback R679 Discovery Miles 6 790
The Business Analyst - Information…
Vernon Zwiers Paperback R657 R606 Discovery Miles 6 060
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, … Hardcover R2,460 Discovery Miles 24 600
Program Construction - Calculating…
Roland Backhouse Paperback R2,460 Discovery Miles 24 600
Air - Elements: Book 4
John Boyne Hardcover R355 R317 Discovery Miles 3 170
Blood Brothers - To Battleground…
Deon Lamprecht Paperback  (1)
R295 R264 Discovery Miles 2 640
The Boat Runner
Devin Murphy Paperback R414 Discovery Miles 4 140
Memoirs of the Civil War in Wales and…
John Roland Phillips Paperback R605 Discovery Miles 6 050

 

Partners