![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
Jack Ganssle has been forming the careers of embedded engineers for
20+ years. He has done this with four books, over 500 articles, a
weekly column, and continuous lecturing. Technology moves fast and
since the first edition of this best-selling classic much has
changed. The new edition will reflect the author's new and ever
evolving philosophy in the face of new technology and realities.
Misinformation is about inaccurate and deceptive information that is spread unintentionally, although disinformation describes incorrect or misleading information that is disseminated purposefully. The point is that both lead to lasting misperceptions. This book focuses on information manipulation in different areas including finance and economy, health, society and the public, ecology, science and technology, and politics. It considers the effects of misinformation/disinformation on organizations, human resources, customers, citizens, and governments. Additionally, it describes detection models and approaches of misinformation/disinformation as well as anti-misinformation actions, policies, and laws. Misinformation and disinformation in social media and messaging apps are discussed in this book as well. Therefore, this book is a collective resource with comprehensive knowledge in the areas of misinformation and disinformation. It is not only about misinformation/ disinformation in social media and politics, but also discusses misinformation and disinformation in other fields particularly organization, health, and the economy. Target audiences are practitioners (managers, engineers, and experts in various fields including finance and economy, health, society and the public, ecology, science and technology, and politics), academics (researchers, lecturers, and advanced students), and professional institutions.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
Strategists describe networking and being able to access knowledge as the leading path to gaining a competitive advantage. ""Cultural Implications of Knowledge Sharing, Management and Transfer: Identifying Competitive Advantage"" gathers contributions of scholars from multi-disciplinary fields to illustrate, compare, and discuss models, perspectives, and approaches involved in the distribution, administration, and transmission of knowledge across organizations. Containing research from leading international experts, this defining reference collection offers diverse viewpoints and depicts possible trajectories of future development in achieving competitive advantage.
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.
ADA Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of ADA, and what's more convenient than getting to know both sides! Want to know More? Buy It Now
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
Early in recorded human history, the literacy rate was as low as one percent, and reading materials were available to only the elite. How times have changed In "Information Age Tales, " author Brad Bradford chronicles these changes, documenting how technology growth continues to change the world, upsetting the balance of power on almost every continent. "Information Age Tales" recaps the history of speech, languages, writing, and memory and describes how these revolutions paved the way for today's age of cyberspace. He shows how history may be repeating itself as knowledge-sharing information technology such as Facebook and Twitter have a global effect. Bradford presents an information technology trail that includes concepts such as the following: Water monkeys may have been our ancestors. Fearsome Mongol warriors played a positive role in the rise of Western Civilization. Hindus in India and the Arabs unveiled long-hidden numerical tools needed for modern science to emerge in the West. Interchangeable parts appear more than four centuries before Eli Whitney won his historic patent to manufacture muskets with them. "Information Age Tales" imparts stories revolving around the wonders of the written word and shows the role technology has played in the rise of past civilizations.
Digital technology is ever-changing, which means that those working or planning to work in IT or apply IT systems must strategize how and what applications and technologies are ideal for sustainable civilization and human development. Developmental trends of IT and the digitalization of enterprise, agriculture, healthcare, education, and more must be explored within the boundaries of ethics and law in order to ensure that IT does not have a harmful effect on society. The Strategies of Informing Technology in the 21st Century is a critical authored reference book that develops the strategic attitude in developing and operating IT applications based on the requirements of sustainable civilization and ethical and wise applications of technology in society. Technological progress is examined including trends in automation, artificial intelligence, and information systems. The book also specifically covers applications of digital informing strategies in business, healthcare, agriculture, education, and the home. Covering key concepts such as automation, robotization, and digital infrastructure, it is ideal for IT executives, CIS/MIS/CS faculty, cyber ethics professionals, technologists, systems engineers, IT specialists and consultants, security analysts, students, researchers, and academicians.
Due to growing technologies for learning processes, universities are making modifications in the development and construction of courses and services they offer. ""Monitoring and Assessment in Online Collaborative Environments: Emergent Computational Technologies for E-Learning Support"" focuses on new models and systems that perform efficient evaluation of student activity in Internet-based education. Containing research from leading international experts, this Premier Reference Source introduces original case studies and experiences of educators worldwide regarding e-learning activities.
This edited book focuses on concepts and their applications using the theory of conceptual spaces, one of today's most central tracks of cognitive science discourse. It features 15 papers based on topics presented at the Conceptual Spaces @ Work 2016 conference. The contributors interweave both theory and applications in their papers. Among the first mentioned are studies on metatheories, logical and systemic implications of the theory, as well as relations between concepts and language. Examples of the latter include explanatory models of paradigm shifts and evolution in science as well as dilemmas and issues of health, ethics, and education. The theory of conceptual spaces overcomes many translational issues between academic theoretization and practical applications. The paradigm is mainly associated with structural explanations, such as categorization and meronomy. However, the community has also been relating it to relations, functions, and systems. The book presents work that provides a geometric model for the representation of human conceptual knowledge that bridges the symbolic and the sub-conceptual levels of representation. The model has already proven to have a broad range of applicability beyond cognitive science and even across a number of disciplines related to concepts and representation.
At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the internet and the world wide web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. ""Handbook of Research on Virtual Workplaces and the New Nature of Business Practices"" compiles authoritative research from XX scholars from over XX countries, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace.
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. ""Computational Advancements in End-User Technologies: Emerging Models and Frameworks"" contains leading research and practices into the advancement, significance, and comprehensive nature of end-user computing. A defining collection of significant tools, applications, and methodologies within this expanding field of study, this publication provides academicians, researchers, and practitioners with a complete and practical resource of expert international findings.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
Intended for both the student and the practitioner, this is the
first user-centered design casebook. It follows the Harvard Case
study method, where the reader is placed in the role of the
decision-maker in a real-life professional situation. In this book,
the reader is asked to perform analysis of dozens of UCD work
situations and propose solutions for the problem set.
Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas. |
You may like...
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, …
Paperback
|