0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (74)
  • R250 - R500 (403)
  • R500+ (14,596)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Data Mining, Southeast Asia Edition (Paperback, 2nd edition): Jiawei Han, Jian Pei, Micheline Kamber Data Mining, Southeast Asia Edition (Paperback, 2nd edition)
Jiawei Han, Jian Pei, Micheline Kamber
R1,145 Discovery Miles 11 450 Ships in 10 - 15 working days

Our ability to generate and collect data has been increasing rapidly. Not only are all of our business, scientific, and government transactions now computerized, but the widespread use of digital cameras, publication tools, and bar codes also generate data. On the collection side, scanned text and image platforms, satellite remote sensing systems, and the World Wide Web have flooded us with a tremendous amount of data. This explosive growth has generated an even more urgent need for new techniques and automated tools that can help us transform this data into useful information and knowledge. Like the first edition, voted the most popular data mining book by KD Nuggets readers, this book explores concepts and techniques for the discovery of patterns hidden in large data sets, focusing on issues relating to their feasibility, usefulness, effectiveness, and scalability. However, since the publication of the first edition, great progress has been made in the development of new data mining methods, systems, and applications. This new edition substantially enhances the first edition, and new chapters have been added to address recent developments on mining complex types of data- including stream data, sequence data, graph structured data, social network data, and multi-relational data.

Information Systems Strategic Planning for Public Service Delivery in the Digital Era (Hardcover): Emanuel Camilleri Information Systems Strategic Planning for Public Service Delivery in the Digital Era (Hardcover)
Emanuel Camilleri
R5,628 Discovery Miles 56 280 Ships in 18 - 22 working days

Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.

SQL for Data Scientists - A Beginner's Guide for Building Datasets for Analysis (Paperback): RMP Teat SQL for Data Scientists - A Beginner's Guide for Building Datasets for Analysis (Paperback)
RMP Teat
R836 Discovery Miles 8 360 Ships in 10 - 15 working days

Jump-start your career as a data scientist--learn to develop datasets for exploration, analysis, and machine learning SQL for Data Scientists: A Beginner's Guide for Building Datasets for Analysis is a resource that's dedicated to the Structured Query Language (SQL) and dataset design skills that data scientists use most. Aspiring data scientists will learn how to how to construct datasets for exploration, analysis, and machine learning. You can also discover how to approach query design and develop SQL code to extract data insights while avoiding common pitfalls. You may be one of many people who are entering the field of Data Science from a range of professions and educational backgrounds, such as business analytics, social science, physics, economics, and computer science. Like many of them, you may have conducted analyses using spreadsheets as data sources, but never retrieved and engineered datasets from a relational database using SQL, which is a programming language designed for managing databases and extracting data. This guide for data scientists differs from other instructional guides on the subject. It doesn't cover SQL broadly. Instead, you'll learn the subset of SQL skills that data analysts and data scientists use frequently. You'll also gain practical advice and direction on "how to think about constructing your dataset." Gain an understanding of relational database structure, query design, and SQL syntax Develop queries to construct datasets for use in applications like interactive reports and machine learning algorithms Review strategies and approaches so you can design analytical datasets Practice your techniques with the provided database and SQL code In this book, author Renee Teate shares knowledge gained during a 15-year career working with data, in roles ranging from database developer to data analyst to data scientist. She guides you through SQL code and dataset design concepts from an industry practitioner's perspective, moving your data scientist career forward!

Exploring Advances in Interdisciplinary Data Mining and Analytics - New Trends (Hardcover): David Taniar, Lukman Hakim Iwan Exploring Advances in Interdisciplinary Data Mining and Analytics - New Trends (Hardcover)
David Taniar, Lukman Hakim Iwan
R4,941 Discovery Miles 49 410 Ships in 18 - 22 working days

Data mining is still a relatively young field, expanding at the rate of technology while advancing tools and techniques for gaining knowledge, finding patterns, and managing databases. Exploring Advances in Interdisciplinary Data Mining and Analytics: New Trends is an updated look at the state of technology in the field of data mining and analytics. As processor speeds, database size, network capabilities, artificial intelligence, and most fields of hardware and software continue to improve at a staggering rate of increased capability and pace, it is vital for practitioners to stay abreast of the current issues and research in the field. This volume is perfect for IT specialists, data analysts, practitioners and academics alike, offering the latest technological, analytical, ethical, and commercial perspectives on topics in data mining.

Contemporary Issues in Database Design and Information Systems Development (Hardcover): Contemporary Issues in Database Design and Information Systems Development (Hardcover)
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover): P. Karthikeyan, Polinpapilinho F.... New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover)
P. Karthikeyan, Polinpapilinho F. Katina, S.P. Anandaraj
R6,685 Discovery Miles 66 850 Ships in 18 - 22 working days

Even though many data analytics tools have been developed in the past years, their usage in the field of cyber twin warrants new approaches that consider various aspects including unified data representation, zero-day attack detection, data sharing across threat detection systems, real-time analysis, sampling, dimensionality reduction, resource-constrained data processing, and time series analysis for anomaly detection. Further study is required to fully understand the opportunities, benefits, and difficulties of data analytics and the internet of things in today's modern world. New Approaches to Data Analytics and Internet of Things Through Digital Twin considers how data analytics and the internet of things can be used successfully within the field of digital twin as well as the potential future directions of these technologies. Covering key topics such as edge networks, deep learning, intelligent data analytics, and knowledge discovery, this reference work is ideal for computer scientists, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students.

Temporal and Spatio-temporal Data Mining (Hardcover): Wynne Hsu, Mong Li Lee, Junmei Wang Temporal and Spatio-temporal Data Mining (Hardcover)
Wynne Hsu, Mong Li Lee, Junmei Wang
R2,601 Discovery Miles 26 010 Ships in 18 - 22 working days

Addresses different scenarios when finding complex relationships in spatiotemporal data by modeling them as graphs, giving readers a comprehensive synopsis on two successful partition-based algorithms designed by the authors.

Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed.... Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed. 2020)
Luis Teran
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

Electronic participation is an emerging and growing research area that makes use of internet solutions to enhance citizens' participation in government processes in order to provide a fair and efficient society. This book examines recommender-system technologies and voting advice applications as tools to enable electronic citizen participation during election campaigns. Further, making use of fuzzy classification, it provides an evaluation framework for eParticipation. A dynamic voting advice application developed for the 2017 Ecuador national election serves as a real-world case study to introduce readers to the practical implementation and evaluation issues. The book concludes with a comprehensive analysis of the 2017 election project based on altmetrics, Google Analytics and statistics from the case study.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Insightful Data Visualization with SAS Viya (Hardcover): Falko Schulz, Travis Murphy Insightful Data Visualization with SAS Viya (Hardcover)
Falko Schulz, Travis Murphy
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New): Jose Carlos Ramalho, Alberto... Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New)
Jose Carlos Ramalho, Alberto Simoes, Ricardo Queiros
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.

Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,189 Discovery Miles 81 890 Ships in 18 - 22 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,625 Discovery Miles 36 250 Ships in 10 - 15 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought... The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought (Hardcover)
Spencer J. Pack
R3,339 Discovery Miles 33 390 Ships in 10 - 15 working days

In The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa. The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes' general theory to his special theory and Rothbard's relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy's instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency. The book's relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R1,870 R1,522 Discovery Miles 15 220 Save R348 (19%) Ships in 18 - 22 working days
Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover): Li Yan, Zongmin Ma Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover)
Li Yan, Zongmin Ma
R4,606 Discovery Miles 46 060 Ships in 18 - 22 working days

Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world. Advanced Database Query Systems: Techniques, Applications and Technologies focuses on technologies and methodologies of database queries, XML and metadata queries, and applications of database query systems, aiming at providing a single account of technologies and practices in advanced database query systems. This book provides the state of the art information for academics, researchers and industry practitioners who are interested in the study, use, design and development of advanced and emerging database queries with ultimate aim of building competencies for exploiting the opportunities of the data and knowledge society.

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover): Ricardo Perez-Castillo, Mario G.... Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover)
Ricardo Perez-Castillo, Mario G. Piattini
R4,995 Discovery Miles 49 950 Ships in 18 - 22 working days

Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.

Scrum - Mastery - The Essential Guide to Scrum and Agile Project Management (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP &... Scrum - Mastery - The Essential Guide to Scrum and Agile Project Management (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal (Hardcover)
Greg Caldwell
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
Cross-Disciplinary Models and Applications of Database Management - Advancing Approaches (Hardcover): Keng Siau Cross-Disciplinary Models and Applications of Database Management - Advancing Approaches (Hardcover)
Keng Siau
R5,017 Discovery Miles 50 170 Ships in 18 - 22 working days

Within a given enterprise, database management involves the monitoring, administration, and maintenance of the databases, which constantly change with new technologies and new forms of data. Cross-Disciplinary Models and Applications of Database Management: Advancing Approaches is an updated look at the latest tools and technology within the burgeoning field of database management. Perfect for the network administrator, technician, information technology specialist or consultant, or for academics and students, this volume presents the latest the field has to offer by way of cases and new research. As database languages, models, and systems change, it s vital for practitioners within the field to stay abreast of the latest research and methods being used around the world, and this book offers the most current advances available.

Data Intensive Distributed Computing - Challenges and Solutions for Large-scale Information Management (Hardcover, Revised... Data Intensive Distributed Computing - Challenges and Solutions for Large-scale Information Management (Hardcover, Revised ed.)
Tevfik Kosar
R4,582 Discovery Miles 45 820 Ships in 18 - 22 working days

Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management focuses on the challenges of distributed systems imposed by data intensive applications and on the different state-of-the-art solutions proposed to overcome such challenges. Providing hints on how to manage low-level data handling issues when performing data intensive distributed computing, this publication is ideal for scientists, researchers, engineers, and application developers, alike. With the knowledge of the correct data management techniques for their applications, readers will be able to focus on their primary goal, assured that their data management needs are handled reliably and efficiently.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Algorithmic and Computational Robotics…
Bruce Donald, Kevin Lynch, … Paperback R1,800 Discovery Miles 18 000
Using Robots in Hazardous Environments…
Y. Baudoin, M. K. Habib Paperback R5,316 Discovery Miles 53 160
Structural Nonlinear Dynamics and…
Mohamed Belhaq Hardcover R7,732 R6,546 Discovery Miles 65 460
The BOXES Methodology Second Edition…
David W. Russell Hardcover R3,996 Discovery Miles 39 960
Qualitative Analysis of Nonsmooth…
Alain Leger, Elaine Pratt Hardcover R2,320 Discovery Miles 23 200
Progress in Turbulence VIII…
Ramis Oerlu, Alessandro Talamelli, … Hardcover R4,057 Discovery Miles 40 570
Business Intelligence with SQL Server…
Adam Aspin Paperback R1,576 Discovery Miles 15 760
Dynamic Systems with Time Delays…
Ju H. Park, Tae H. Lee, … Hardcover R3,153 Discovery Miles 31 530
Securing SQL Server - Protecting Your…
Denny Cherry Paperback R1,061 Discovery Miles 10 610
Motion Control of Biomimetic Swimming…
Junzhi Yu, Min Tan Hardcover R3,791 Discovery Miles 37 910

 

Partners