![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.
As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amounts of data, and flexibility in operation, RFID aims to revamp the new millennium. Advanced RFID Systems, Security, and Applications features a comprehensive collection of research provided by leading experts in both academia and industries. This leading reference source provides state-of-the- art development on RFID and its contents will be of the upmost use to students and researchers at all levels as well as technologists, planners, and policy makers. RFID technology is progressing into a new phase of development.
For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
We live in an increasingly interconnected and highly sophisticated society, where the Internet has led to tremendous improvements in the efficiency and effectiveness of public services. The Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements illustrates how technology in e-government saves individuals significant amounts of time and money, while adding value to citizens' experiences with government, thus better serving their needs. This handbook provides comprehensive coverage of the issues facing managers, consultants, and practitioners in e-government and assists them in formulating ICT strategies for use within their field. These new strategies will enable them to implement collaborative policy initiatives within the private, public, and non-profit sectors to ultimately eliminate the global digital divide.
An Address Book Designed for Social Media Lovers, Bloggers, YouTubers, Entrepreneurs, Business Professionals and anyone who uses the Internet every day. Created by YouTuber and Blogger, Sherry Adepitan. Record Internet Usernames and Passwords, Website Addresses and Additional Information. Never forget another Password.
Artificial Higher Order Neural Networks (HONNs) significantly change the research methodology that is used in economics and business areas for nonlinear data simulation and prediction. With the important advances in HONNs, it becomes imperative to remain knowledgeable about its benefits and improvements. Artificial Higher Order Neural Networks for Economics and Business is the first book to provide practical education and applications for the millions of professionals working in economics, accounting, finance and other business areas on HONNs and the ease of their usage to obtain more accurate application results. This source provides significant, informative advancements in the subject and introduces the concepts of HONN group models and adaptive HONNs.
Although the field of informal learning has much to contribute to the field of formal learning, these fields appear to be failing to synergize and balance to create the ideal education environment. Multiple Literacy and Science Education: ICTs in Formal and Informal Learning Environments explores the nature of various learning enlightenment mediums and their consequences within a classroom context to synchronize understanding within the schooling fields. This authoritative collection provides an overview of current research, practices, and evidence-based approaches regarding further development for best practices of multiple literacy teaching atmospheres.
The information economy continues to challenge businesses in many ways with information technologies and globalization leading to blurred the organizational boundaries. ""Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology"" provides greater understanding of issues, challenges, trends, and technologies effecting the overall utilization and management of information in modern organizations around the world. A leading field resource, this innovative collection addresses the emerging issues in information resources economics and its applications.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
Cellular Automata (CA) are a class of spatially and temporally discrete mathematical systems characterized by local interaction and synchronous dynamical evolution, which show complex behavior and are able to model biological phenomena. Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena describes the use of cellular automata to provide important insights into a vast range of physical, biological, social, economic and psychological phenomena. This book presents contemporary research on discrete dynamical systems such as one-dimensional and two-dimensional cellular automata and outlines how these systems can be exploited for artistic purposes, translating their mathematical configurations into music and visual media.
In today's technology-crazed environement, distance learning is touted as a cost-effective option for delivering employee training and higher education programs, such as as bachelor's, master's and even doctroal degrees. Distance Learning Technologies: Issues, Trends and Opportunities provides readers with an in-depth understanding of distance learning and the technologies available for this innovative medium of learning and instruction. It races the development of distance learning from its history and includes suggestions for a solid strategic implementation plan to ensure its successful and effective deployment.
C# Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Sample codes,are provided for a more visual approach on your learning You will also learn the designs and forms of C#, and what's more convenient than getting to know both sides! Want to know More? Buy Now
This book provides application of multi criteria decision making techniques for managerial discretion. With this book, a concerted platform has been provided for several peers and other management organizations to understand and implement these tools and deal with the practical problems in a better way so as to provide more robust managerial decision making.
Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage across a range of applicable perspectives and topics, such as neighborhood attacks, fast k-degree anonymization (FKDA), and vertex-clustering algorithms, this book is ideally designed for academics, researchers, post-graduates, and practitioners seeking current research on undirected networks and greedy algorithms for social network anonymization.
The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world.
Early in recorded human history, the literacy rate was as low as one percent, and reading materials were available to only the elite. How times have changed In "Information Age Tales, " author Brad Bradford chronicles these changes, documenting how technology growth continues to change the world, upsetting the balance of power on almost every continent. "Information Age Tales" recaps the history of speech, languages, writing, and memory and describes how these revolutions paved the way for today's age of cyberspace. He shows how history may be repeating itself as knowledge-sharing information technology such as Facebook and Twitter have a global effect. Bradford presents an information technology trail that includes concepts such as the following: Water monkeys may have been our ancestors. Fearsome Mongol warriors played a positive role in the rise of Western Civilization. Hindus in India and the Arabs unveiled long-hidden numerical tools needed for modern science to emerge in the West. Interchangeable parts appear more than four centuries before Eli Whitney won his historic patent to manufacture muskets with them. "Information Age Tales" imparts stories revolving around the wonders of the written word and shows the role technology has played in the rise of past civilizations. |
You may like...
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|