![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
A decade after Anonymous first appeared, it has grown from a small band of hacktivists to a Global Collective with organized National Cells in half the countries on Earth and 2.5 million dedicated participants worldwide. Behind The Mask explores four critical years in the formation of Anonymous as it solidified into the most powerful movement in human history. Join Commander X and other Anons from those early days as they take you on a grand adventure, and give everyone a small glimpse Behind The Mask. www.BehindTheMask.cf
The information economy continues to challenge businesses in many ways with information technologies and globalization leading to blurred the organizational boundaries. ""Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology"" provides greater understanding of issues, challenges, trends, and technologies effecting the overall utilization and management of information in modern organizations around the world. A leading field resource, this innovative collection addresses the emerging issues in information resources economics and its applications.
In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Deployment, the aim is to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The past two decades have witnessed an extremely fast evolution of mobile cellular network technology. The fifth generation of mobile wireless systems has achieved the first milestone toward finalization and deployment by 2020. This is vital to the development of future multimedia communications. Also, it is necessary to consider 5G technology from the performance point of view by analyzing network capabilities to the operator and to the end user in terms of data rate, capacity, coverage, energy efficiency, connectivity and latency. The book is divided into three major parts with each part containing four to seven chapters: * Critical enabling technology * Multiservices network * Deployment scenarios The first part discusses enabling technologies, such as green communication, channel modeling, massive and distributed MIMO and ML-based networks. In the second part, different methodologies and standards for multiservices have been discussed. Exclusive chapters have been dedicated to each of the open research challenges such as multimedia operating in 5G environment, network slicing optimization, mobile edge computing, mobile video multicast/broadcast, integrated satellite and drone communication. The third part paved the way to deployment scenarios for different innovative services including integration of a multienergy system in smart cities, intelligent transportation systems, 5G connectivity in the transport sector, healthcare services, 5G edge-based video surveillance and challenges of connectivity for massive IoT in 5G and beyond systems. The book is written by experts in the field who introduced scientific and engineering concepts, covering the 5G multimedia communication areas. The book can be read cover-to-cover or selectively in the areas of interest for the readers. Generally, the book is intended for novel readers who could benefit from understanding general concepts, practitioners who seek guidance into the field and senior-level as well as graduate-level engineering students in understanding the process of today's wireless multimedia communications.
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
Advances in web technology and the proliferation of sensors and mobile devices connected to the internet have resulted in the generation of immense data sets available on the web that need to be represented, saved, and exchanged. Massive data can be managed effectively and efficiently to support various problem-solving and decision-making techniques. Emerging Technologies and Applications in Data Modeling and Processing is a critical scholarly publication that examines the importance of data management strategies that coincide with advancements in web technologies. Highlighting topics such as geospatial coverages, data analysis, and keyword query, this book is ideal for professionals, researchers, academicians, data analysts, web developers, and web engineers.
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.
This is an overview of the end-to-end data cleaning process. Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, this book describes various error detection and repair methods, and attempts to anchor these proposals with multiple taxonomies and views. Specifically, it covers four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, it includes a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.
Misinformation is about inaccurate and deceptive information that is spread unintentionally, although disinformation describes incorrect or misleading information that is disseminated purposefully. The point is that both lead to lasting misperceptions. This book focuses on information manipulation in different areas including finance and economy, health, society and the public, ecology, science and technology, and politics. It considers the effects of misinformation/disinformation on organizations, human resources, customers, citizens, and governments. Additionally, it describes detection models and approaches of misinformation/disinformation as well as anti-misinformation actions, policies, and laws. Misinformation and disinformation in social media and messaging apps are discussed in this book as well. Therefore, this book is a collective resource with comprehensive knowledge in the areas of misinformation and disinformation. It is not only about misinformation/ disinformation in social media and politics, but also discusses misinformation and disinformation in other fields particularly organization, health, and the economy. Target audiences are practitioners (managers, engineers, and experts in various fields including finance and economy, health, society and the public, ecology, science and technology, and politics), academics (researchers, lecturers, and advanced students), and professional institutions.
What is research in education? And what is it for in a digital age? Reflecting upon these questions, this engaging introduction provides critical discussion about the dilemmas of researching education in the digital age and ways forward for research in this complex area. Research Methods for Education in the Digital Age begins by outlining forms of education that are seen as digital, such as virtual, blended, immersive learning and examining the extent to which these are different or just adapted versions of earlier methods and approaches to education. Maggi Savin-Baden and Gemma Tombs explore current practices in research, identifying the successful adoption and adaption of theories and present practical guidance on new and emerging methodologies, methods, and analytical practices for undertaking educational research. New methodologies discussed include digital arts-based inquiry and digital visual methodologies, as well as adaptations of widely used methodologies such as ethnography, for the specific needs of researching digital teaching and learning. The book outlines the major challenges faced by today's digital researchers, exploring approaches to digital ethics, the relationship between qualitative and quantitative data in the digital age, digital data representations and portrayal and suggests helpful ways of dealing with the complexities and ethical challenges of undertaking research in and for digital spaces. Using case studies, research tips, a glossary and annotated further reading, the authors take a step by step approach from conceptualizing the research ideas, selecting the appropriate method to the dissemination of the findings. At a time when education is changing rapidly with digital and technological advances, Research Methods for Education in the Digital Age is essential reading for researchers wanting to undertake sound and rigorous research in the digital domain.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
Strategists describe networking and being able to access knowledge as the leading path to gaining a competitive advantage. ""Cultural Implications of Knowledge Sharing, Management and Transfer: Identifying Competitive Advantage"" gathers contributions of scholars from multi-disciplinary fields to illustrate, compare, and discuss models, perspectives, and approaches involved in the distribution, administration, and transmission of knowledge across organizations. Containing research from leading international experts, this defining reference collection offers diverse viewpoints and depicts possible trajectories of future development in achieving competitive advantage.
ADA Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of ADA, and what's more convenient than getting to know both sides! Want to know More? Buy It Now
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.
Early in recorded human history, the literacy rate was as low as one percent, and reading materials were available to only the elite. How times have changed In "Information Age Tales, " author Brad Bradford chronicles these changes, documenting how technology growth continues to change the world, upsetting the balance of power on almost every continent. "Information Age Tales" recaps the history of speech, languages, writing, and memory and describes how these revolutions paved the way for today's age of cyberspace. He shows how history may be repeating itself as knowledge-sharing information technology such as Facebook and Twitter have a global effect. Bradford presents an information technology trail that includes concepts such as the following: Water monkeys may have been our ancestors. Fearsome Mongol warriors played a positive role in the rise of Western Civilization. Hindus in India and the Arabs unveiled long-hidden numerical tools needed for modern science to emerge in the West. Interchangeable parts appear more than four centuries before Eli Whitney won his historic patent to manufacture muskets with them. "Information Age Tales" imparts stories revolving around the wonders of the written word and shows the role technology has played in the rise of past civilizations.
Digital technology is ever-changing, which means that those working or planning to work in IT or apply IT systems must strategize how and what applications and technologies are ideal for sustainable civilization and human development. Developmental trends of IT and the digitalization of enterprise, agriculture, healthcare, education, and more must be explored within the boundaries of ethics and law in order to ensure that IT does not have a harmful effect on society. The Strategies of Informing Technology in the 21st Century is a critical authored reference book that develops the strategic attitude in developing and operating IT applications based on the requirements of sustainable civilization and ethical and wise applications of technology in society. Technological progress is examined including trends in automation, artificial intelligence, and information systems. The book also specifically covers applications of digital informing strategies in business, healthcare, agriculture, education, and the home. Covering key concepts such as automation, robotization, and digital infrastructure, it is ideal for IT executives, CIS/MIS/CS faculty, cyber ethics professionals, technologists, systems engineers, IT specialists and consultants, security analysts, students, researchers, and academicians.
Interactive systems in the mobile, ubiquitous, and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use and usability of these systems. Ubiquitous Computing: Design, Implementation and Usability highlights the emergent usability theories, techniques, tools and best practices in these environments. This book shows that usable and useful systems are able to be achieved in ways that will improve usability to enhance user experiences. Research on the usability issues for young children, teenagers, adults, and the elderly is presented, with different techniques for the mobile, ubiquitous, and virtual environments. |
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
Agent-Based Modeling and Network…
Akira Namatame, Shu-Heng Chen
Hardcover
R2,970
Discovery Miles 29 700
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
|