|
|
Books > Computing & IT > General theory of computing
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
Recent advancements and innovations in medical image and data
processing have led to a need for robust and secure mechanisms to
transfer images and signals over the internet and maintain
copyright protection. The Handbook of Research on Information
Security in Biomedical Signal Processing provides emerging research
on security in biomedical data as well as techniques for accurate
reading and further processing. While highlighting topics such as
image processing, secure access, and watermarking, this publication
explores advanced models and algorithms in information security in
the modern healthcare system. This publication is a vital resource
for academicians, medical professionals, technology developers,
researchers, students, and practitioners seeking current research
on intelligent techniques in medical data security.
This book describes the development of an intrusion detection
system for online poker, which uses player's game strategy as the
behavioral profile. The system is improved by modifications to the
similarity measure functions and different ways of representing
behavioral signatures. The system is further enhanced by inclusion
of spatial, temporal and contextual information about the
environment alongside the user's behavior. Possibility of creation
of artificial behavioral profiles and use of such profiles for
spoofing of behavior-based security systems is investigated and
promising results are achieved. In a somewhat related research,
recognizing importance of games in our experiments, it is proven
that poker is a game of skill. Finally, a number of games are
analyzed in terms of their spatial ontologies.
Cases on Progressions and Challenges in ICT Utilization for
Citizen-Centric Governance is a collection of case studies on the
advancements and challenges of information technology in the
involvements of citizens with the government. With contributions
from authors around the world, this compilation is relevant to
researchers, academics, and practitioners who wish to stay informed
of the new world of technology in the government.
Yours can be the first APPLE house on the block! Learn how to save
time and money by using your Apple II computer to control your
home: the security, lights, temperature, telephone, and much more.
With John Blankenship's system of software and hardware, your house
can accept verbal commands and respond with its own voice. It does
not need human instruction and performs many useful tasks on its
own. Once you get used to an intelligent house, you will wonder how
you ever got along without one. Even though devices featured in The
Apple House can be purchased, the author shows how you can save
money by building some from scratch. He also points out that you
can substitute equipment you already own because of the system's
modularity. Although written with an Apple II computer in mind, the
principles discussed can easily be transferred to other computer
systems.
 |
Excel for beginners
- Learn Excel 2016, Including an Introduction to Formulas, Functions, Graphs, Charts, Macros, Modelling, Pivot Tables, Dashboards, Reports, Statistics, Excel Power Query, and More
(Hardcover)
Greg Shields
|
R655
R584
Discovery Miles 5 840
Save R71 (11%)
|
Ships in 18 - 22 working days
|
|
|
Services both as a science and as a practice in today's corporate
environments are suffering from many suboptimalities. A compromise
of both organizational and technological aspects provides the
answer to many pitfalls and shortcomings currently faced. ""Service
Science for Socio-Economical and Information Systems Advancement:
Holistic Methodologies"" sheds light on a variety of issues and
shortcomings of service-based economies by analyzing situations and
modern practices that improve the way researchers, field
practitioners, and ICT professionals account for their core
business service-related activities. This defining body of research
provides a broad perspective of how to improve service creation,
production, and management of assets.
With the ever-present growth in technology, opportunities to
explore and experience technology at an early age are increasingly
important in order to develop problem-solving and thinking skills.
""Technology for Early Childhood Education and Socialization:
Developmental Applications and Methodologies"" provides readers
with valuable and authentic research on how technology relates to
early childhood growth. Including international perspectives on
technology and education from expert authors, this book discusses
important issues of assessment, teacher education, special
education, and family involvement in terms of technology.
The long-standing cultural imperative of augmenting human intellect
continues to move ever closer to its full manifestation, described
by Marshall McLuhan as an extension of the human nervous system.
The escalating blending of immersive technologies with advanced
computation has created an emerging domain which increasingly
allows socio-technical system makers to produce not only
human-computer interactions, but advanced, multi-minded
human+computer (H+C) systems. The critical shift toward user
immersion within systems of digital information and simulation
makes the scale of immersive media's potential impact on human
life, culture and well-being unlike that of any previous medium. In
Designing XR, Peter (Zak) Zakrzewski presents H+C immersion as a
multi-dimensional design problem - a Research Through Design (RTD)
zone which addresses the question of: How can transformative
design-thinking-based knowledge system complement the existing
human-computer interaction (HCI) invention model to contribute to
the creation of more participatory, socially viable, and humane
immersive media environments? The book lays out a proposal for
ushering the creation of ecologically sound augmented mind based on
two essential tasks. The first involves a framework for the design,
implementation, and iteration of purposeful, multi-minded,
participatory immersive H+C systems. The second focuses on the
extended reality experience (XRX) design practice that rhetorically
invites users to actively engage with immersive systems while fully
exercising their autonomy and agency based on informed choice.
Not only have educators and trainers alike begun to harness the
power of instructional technology and human performance techniques,
but now businesses and industries have incorporated these
technologies for training development and performance improvement.
""The Handbook of Research on Human Performance and Instructional
Technology"" provides theoretical understanding of the essential
link between education, training development, organization
development, performance improvement, and instructional technology.
An innovative publication useful to worldwide businesses, industry,
schools, and higher academic institutions, this Handbook of
Research is instrumental in providing the latest knowledge related
to instructional technology and human performance in order to meet
the needs and challenges of tomorrow.
In this technological era, failure to address application-layer
fault-tolerance, a key ingredient to crafting truly dependable
computer services, leaves the door open to unfortunate consequences
in quality of service.""Application-Layer Fault-Tolerance
Protocols"" increases awareness of the need for application-layer
fault-tolerance (ALFT) through introduction of problems and
qualitative analysis of solutions. A necessary read for
researchers, practitioners, and students in dependability
engineering, this book collects emerging research to offer a
systematic, critical organization of the current knowledge in ALFT.
This it the first technical reference book available on the PSoC,
and it offers the most comprehensive combination of technical data,
example code, and descriptive prose you ll find anywhere.
Embedded design expert Robert Ashby will guide you through the
entire PSoC world, providing thorough coverage of device feature,
design, programming and development of the software-reconfigurable
PSoC. He shares his best tips, tricks, and techniques that will
help you to utilize the flexible and inexpensive PSoC to its
greatest potential, with a minimum of heartaches and late nights.
With its emphasis on designing for adaptability -- a feature of the
utmost importance in today s fast-paced and cost-pressured design
cycles -- this book will bring you up to speed quickly on
everything PSoC, from memory management to interconnects. You will
add brains and capable signal conditioning to a design with one
chip, giving you extreme flexibility for a relatively low price.
Specific application examples highlighting the PSoC s unique
capabilities are included throughout the text, with the supporting
sample source code. This valuable code is also provided on the
companion website so you can easily adapt it to your own designs.
* The first independent technical reference available on the PSoC,
a product line experiencing explosive growth in the embedded design
world
* Application examples, sample code, and design tips and techniques
will get readers get up-to-speed quickly
* Companion website includes all example code from book, so that
engineers can easily adapt it to their own designs"
"Birthday Tracker and Journal" is a special place to record
important birthdays for family, friends, and others, month by
month. It includes an informative introduction on birthday
celebration traditions and lists birthday birthstones and flowers
by month for gift-giving considerations. There is also a place to
keep track of birthday cards or presents that you send, or receive,
lined blank pages for your birthday reflections, and a place for
birthday photos. Color illustrations by author/artist Jan Yager
appear throughout. This unique book is a perfect gift or for one's
own use to organize this special birthday information.
In the past, project success has been defined too narrowly as
simply meeting time and cost constraints for a given scope of work.
However, in order for an IT project to be completely successful
that basic definition of success needs to be extended to include
meeting return on investment expectations, product quality,
stakeholder satisfaction, security, maintainability and
adaptability. Also, the formal methods and tools of the project
management discipline need to evolve to address the changes in
modern software engineering and our hightech global workplaces.
With this broader and more appropriate definition of success, IT
project management techniques and tools can be modernized,
extended, and otherwise focused to be more effective. ""Project
Management for Modern Information Systems"" describes and
illustrates practices, procedures, methods, and tools for IT
project management that address this extended definition of project
success for modern times.
This book systematically presents the operating principles and
technical characteristics of the main radio navigating systems
(RNSs) that make it possible to adequately evaluate the
corresponding scratch indexes and levels of air safety for air
vehicles, the chief concern of the International Civil Aviation
Organization (ICAO). The book discusses how RNS systems
substantially determine navigation accuracy and reliability, and
therefore air safety; in addition, it presents practical solutions
to problems arising in the operation and development of RNS
systems.
Agent technologies are believed to be one of the most promising
tools to conduct business via networks and the Web in an
autonomous, intelligent, and efficient way. The ever-expanding
application of business automation necessitates clarification of
the methods and techniques of agent-based electronic business
systems.
A decade after Anonymous first appeared, it has grown from a small
band of hacktivists to a Global Collective with organized National
Cells in half the countries on Earth and 2.5 million dedicated
participants worldwide. Behind The Mask explores four critical
years in the formation of Anonymous as it solidified into the most
powerful movement in human history. Join Commander X and other
Anons from those early days as they take you on a grand adventure,
and give everyone a small glimpse Behind The Mask.
www.BehindTheMask.cf
|
|