|
Books > Computing & IT > General theory of computing
In this technological age, the information technology (IT) industry
is an important facet of society and business. The IT industry is
able to become more efficient and successful through the
examination of its structure and a larger understanding of the
individuals that work in the field. Multidisciplinary Perspectives
on Human Capital and Information Technology Professionals is a
critical scholarly resource that focuses on IT as an industry and
examines it from an array of academic viewpoints. Featuring
coverage on a wide range of topics, such as employee online
communities, role stress, and competence frameworks, this book is
targeted toward academicians, students, and researchers seeking
relevant research on IT as an industry.
Due to the increasing availability of affordable internet services,
the number of users, and the need for a wider range of
multimedia-based applications, internet usage is on the rise. With
so many users and such a large amount of data, the requirements of
analyzing large data sets leads to the need for further
advancements to information processing. Big Data Processing with
Hadoop is an essential reference source that discusses possible
solutions for millions of users working with a variety of data
applications, who expect fast turnaround responses, but encounter
issues with processing data at the rate it comes in. Featuring
research on topics such as market basket analytics, scheduler load
simulator, and writing YARN applications, this book is ideally
designed for IoT professionals, students, and engineers seeking
coverage on many of the real-world challenges regarding big data.
The proliferation of wireless communications has led to mobile
computing, a new era in data communication and processing allowing
people to access information anywhere and anytime using lightweight
computer devices. Aligned with this phenomenon, a vast number of
mobile solutions, systems, and applications have been continuously
developed. However, despite the opportunities, there exist
constraints, challenges, and complexities in realizing the full
potential of mobile computing, requiring research and
experimentation. Algorithms, Methods, and Applications in Mobile
Computing and Communications is a critical scholarly publication
that examines the various aspects of mobile computing and
communications from engineering, business, and organizational
perspectives. The book details current research involving mobility
challenges that hinder service applicability, mobile money transfer
services and anomaly detection, and mobile fog environments. As a
resource rich in information about mobile devices, wireless
broadcast databases, and machine communications, it is an ideal
source for computer scientists, IT specialists, service providers,
information technology professionals, academicians, and researchers
interested in the field of mobile computing.
Changing business environments and information technology
advancements fundamentally reshaped the traditional information
landscape in our contemporary society, urging companies to seek
innovative ways to diffuse and manage assets on a global scale. It
is crucial for society to understand the new methodologies and
common practices that organizations can utilize to leverage their
knowledge into practice. Global Information Diffusion and
Management in Contemporary Society is an essential reference source
featuring research on the development and implementation of
contemporary global information management initiatives in
organizations. Including coverage on a multitude of topics such as
data security, global manufacturing, and information governance,
this book explores the importance of information management in a
global context. This book is ideally designed for managers,
information systems specialists, professionals, researchers, and
administrators seeking current research on the theories and
applications of global information management.
is a pocket-sized book that provides a teach on media concerning
social media and affective media. The context of media described
here can include the media of television in broadcasting. Social
media is based on concept of next generation child from 1- 12 years
who are involved in media of selfie (picture or video uploads). The
next-Gen birth-cast is implemented on Facebook platform with name
?Birthcast?. In this book, affective media is rather on the adult
ages that needs affection sourced as love and searches via on-line
pictures and on-line video or electronic pictures and electronic
video. The media can be accessed on the web at the URL: http:
//www.facebook.com/birthcastridiculous http:
//www.facebook.com/birthcastwormzoo http:
//www.facebook.com/birthcastartlet http:
//www.facebook.com/birthcastbabycob http:
//www.facebook.com/sociocastridicu lous
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
In this Raspberry Pi manual you will learn how to install and
configure a Raspberry Pi and much more. First we will discuss the
history and background of the Raspberry Pi. Then we will go through
all currently available models, technical data, interfaces,
interesting software, hardware projects and available operating
systems. With this Raspberry Pi beginners guide you will build or
expand your knowledge. If your goal is to use the Raspberry Pi to
implement projects for your everyday or professional life, then
this manual is perfect for you. After completing this manual, you
have learned so much about the Raspberry Pi, that you can setup a
Raspberry Pi independently and become creative with your own
projects.
This up-to-date Mike Meyers exam guide delivers complete coverage
of every topic on the N10-008 version of the CompTIA Network+
Certification exam Take the latest version of the CompTIA Network+
Certification exam with complete confidence using the hands-on
information contained in this fully updated self-study system. You
will get clear instruction and real-world examples from training
expert and bestselling author Mike Meyers along with hundreds of
accurate practice questions. CompTIA Network+ Certification
All-in-One Exam Guide, Eighth Edition (Exam N10-008) features a
sample of interactive hands-on labs and simulations and video
training from Mike Meyers. A valuable pre-assessment test enables
you to gauge your familiarity with the test's objectives and tailor
an effective course for study. Fulfilling the promise of the
All-in-One series, this comprehensive reference serves both as a
study tool and a valuable on-the-job reference that will serve you
well beyond the exam. * 100% coverage of every objective for the
CompTIA Network+ Certification exam * Written by CompTIA training
and certification guru Mike Meyers * Online content includes 100
practice questions in the Total Tester exam engine, 22 interactive
labs and simulations, more than an hour of training videos selected
from Mike's full video training course, and a collection of Mike's
favorite freeware and shareware utilities
This organizational history relates the role of the National
Science Foundation (NSF) in the development of modern computing.
Drawing upon new and existing oral histories, extensive use of NSF
documents, and the experience of two of the authors as senior
managers, this book describes how NSF's programmatic activities
originated and evolved to become the primary source of funding for
fundamental research in computing and information technologies. The
book traces how NSF's support has provided facilities and education
for computing usage by all scientific disciplines, aided in
institution and professional community building, supported
fundamental research in computer science and allied disciplines,
and led the efforts to broaden participation in computing by all
segments of society. Today, the research and infrastructure
facilitated by NSF computing programs are significant economic
drivers of American society and industry. For example, NSF
supported work that led to the first widely-used web browser,
Netscape; sponsored the creation of algorithms at the core of the
Google search engine; facilitated the growth of the public
Internet; and funded research on the scientific basis for countless
other applications and technologies. NSF has advanced the
development of human capital and ideas for future advances in
computing and its applications. This account is the first
comprehensive coverage of NSF's role in the extraordinary growth
and expansion of modern computing and its use. It will appeal to
historians of computing, policy makers and leaders in government
and academia, and individuals interested in the history and
development of computing and the NSF.
Data-driven discovery is revolutionizing how we model, predict, and
control complex systems. Now with Python and MATLAB (R), this
textbook trains mathematical scientists and engineers for the next
generation of scientific discovery by offering a broad overview of
the growing intersection of data-driven methods, machine learning,
applied optimization, and classical fields of engineering
mathematics and mathematical physics. With a focus on integrating
dynamical systems modeling and control with modern methods in
applied machine learning, this text includes methods that were
chosen for their relevance, simplicity, and generality. Topics
range from introductory to research-level material, making it
accessible to advanced undergraduate and beginning graduate
students from the engineering and physical sciences. The second
edition features new chapters on reinforcement learning and
physics-informed machine learning, significant new sections
throughout, and chapter exercises. Online supplementary material -
including lecture videos per section, homeworks, data, and code in
MATLAB (R), Python, Julia, and R - available on databookuw.com.
Though traditionally information systems have been centralized,
these systems are now distributed over the web. This requires a
re-investigation into the way information systems are modeled and
designed. Because of this new function, critical problems,
including security, never-fail systems, and quality of service have
begun to emerge. Novel Approaches to Information Systems Design is
an essential publication that explores the most recent,
cutting-edge research in information systems and exposes the reader
to emerging but relatively mature models and techniques in the
area. Highlighting a wide range of topics such as big data,
business intelligence, and energy efficiency, this publication is
ideally designed for managers, administrators, system developers,
information system engineers, researchers, academicians, and
graduate-level students seeking coverage on critical components of
information systems.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|