0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (14)
  • R100 - R250 (584)
  • R250 - R500 (2,277)
  • R500+ (40,802)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Paperback)
Mai Helmy Shaheen
R1,293 Discovery Miles 12 930 Ships in 12 - 17 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Paperback)
James Aweya
R2,404 Discovery Miles 24 040 Ships in 12 - 17 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Architectures and Applications (Paperback)
James Aweya
R2,395 Discovery Miles 23 950 Ships in 12 - 17 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts and Design Methods (Hardcover)
James Aweya
R5,921 Discovery Miles 59 210 Ships in 12 - 17 working days

Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed

Designing Switch/Routers - Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Architectures and Applications (Hardcover)
James Aweya
R5,921 Discovery Miles 59 210 Ships in 12 - 17 working days

Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks

Mechanizing Hypothesis Formation - Principles and Case Studies (Hardcover): Jan Rauch, Milan Simunek, David Chudan, Petr Masa Mechanizing Hypothesis Formation - Principles and Case Studies (Hardcover)
Jan Rauch, Milan Simunek, David Chudan, Petr Masa
R4,612 Discovery Miles 46 120 Ships in 12 - 17 working days

Introduces the GUHA method of mechanizing hypothesis formation as a data mining tool. Presents examples of data mining with enhanced association rules, histograms, contingency tables and action rules. Provides examples of data mining for exception rules and examples of subgroups discovery. Outlines possibilities of GUHA in business intelligence and big data. Overviews related theoretical results and challenges related to mechanizing hypothesis formation.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,252 Discovery Miles 32 520 Ships in 12 - 17 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Coded Leadership - Developing Scalable Management in an AI-induced Quantum World (Hardcover): Pinisetti Swami Sairam,... Coded Leadership - Developing Scalable Management in an AI-induced Quantum World (Hardcover)
Pinisetti Swami Sairam, Hemachandran K, Raul Villamarin Rodriguez
R2,425 Discovery Miles 24 250 Ships in 12 - 17 working days

Introduction to Quantum Natural Language Processing. Overview of Leadership and AI. The Age of Quantum Superiority. Challenges To Today's Leadership. AI-induced Strategic Implementation and Organizational Performance.

Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover):... Blockchain for 6G-Enabled Network-Based Applications - A Vision, Architectural Elements, and Future Directions (Hardcover)
Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry
R3,255 Discovery Miles 32 550 Ships in 12 - 17 working days

This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,538 Discovery Miles 35 380 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Port Automation and Vehicle Scheduling - Advanced Algorithms for Scheduling Problems of AGVs (Hardcover, 3rd edition): Hassan... Port Automation and Vehicle Scheduling - Advanced Algorithms for Scheduling Problems of AGVs (Hardcover, 3rd edition)
Hassan Rashidi, Edward P K Tsang
R3,258 Discovery Miles 32 580 Ships in 12 - 17 working days

Classifies the optimization problems of the ports into five scheduling decisions. For each decision, it supplies an overview, formulates each of the decisions as constraint satisfaction and optimization problems, and then covers possible solutions, implementation, and performance. Part One explores the various optimization problems in modern container terminals, while Part Two details advanced algorithms for the minimum cost flow (MCF) problem and for the scheduling problem of AGVs in ports. A complete package that can help readers address the scheduling problems of AGVs in ports.

CATIA v5 - Advanced Parametric and Hybrid 3D Design (Hardcover): Ionut Ghionea, Sasa Cukovic, Cristian Tarba CATIA v5 - Advanced Parametric and Hybrid 3D Design (Hardcover)
Ionut Ghionea, Sasa Cukovic, Cristian Tarba
R3,893 Discovery Miles 38 930 Ships in 12 - 17 working days

1) Provides the reader with self-study problems to solve, such as 2D models to model in 3D using CATIA 2) Includes access to video tutorials for further understanding of 3D technical modelling 3) Covers topics including programming, automation and scripting 4) Provides examples of realistic and commonly encountered examples, rather than complex theory

Handbook of Moth-Flame Optimization Algorithm - Variants, Hybrids, Improvements, and Applications (Hardcover): Seyed Ali... Handbook of Moth-Flame Optimization Algorithm - Variants, Hybrids, Improvements, and Applications (Hardcover)
Seyed Ali Mirjalili
R3,114 Discovery Miles 31 140 Ships in 12 - 17 working days

Reviews the literature of the Moth-Flame Optimization algorithm; Provides an in-depth analysis of equations, mathematical models, and mechanisms of the Moth-Flame Optimization algorithm; Proposes different variants of the Moth-Flame Optimization algorithm to solve binary, multi-objective, noisy, dynamic, and combinatorial optimization problems; Demonstrates how to design, develop, and test different hybrids of Moth-Flame Optimization algorithm; Introduces several applications areas of the Moth-Flame Optimization algorithm focusing in sustainability.

Handbook of Sustainable Development Through Green Engineering and Technology (Hardcover): Vikram Bali, Rajni Mohana, Ahmed A.... Handbook of Sustainable Development Through Green Engineering and Technology (Hardcover)
Vikram Bali, Rajni Mohana, Ahmed A. Elngar, Sunil Kumar Chawla, Gurpreet Singh
R5,058 Discovery Miles 50 580 Ships in 12 - 17 working days

Provides an overview of the role engineering plays in climate change and environmental pollution Presents an updated overview of Green Engineering focusing on green technology Innovations Explores energy management strategies Discusses green communication technologies, green computing technologies, green smart buildings, green smart lighting, green smart mobility management, fuel-efficient transportation, paperless offices, energy efficiency measures, waste recycling, etc. Identifies the development of sustainable plans and programs at the urban level within the current legislative framework

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,266 Discovery Miles 12 660 Ships in 12 - 17 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Arc-Search Techniques for Interior-Point Methods (Paperback): Yaguang Yang Arc-Search Techniques for Interior-Point Methods (Paperback)
Yaguang Yang
R1,658 Discovery Miles 16 580 Ships in 12 - 17 working days

This book discusses an important area of numerical optimization, called interior-point method. This topic has been popular since the 1980s when people gradually realized that all simplex algorithms were not convergent in polynomial time and many interior-point algorithms could be proved to converge in polynomial time. However, for a long time, there was a noticeable gap between theoretical polynomial bounds of the interior-point algorithms and efficiency of these algorithms. Strategies that were important to the computational efficiency became barriers in the proof of good polynomial bounds. The more the strategies were used in algorithms, the worse the polynomial bounds became. To further exacerbate the problem, Mehrotra's predictor-corrector (MPC) algorithm (the most popular and efficient interior-point algorithm until recently) uses all good strategies and fails to prove the convergence. Therefore, MPC does not have polynomiality, a critical issue with the simplex method. This book discusses recent developments that resolves the dilemma. It has three major parts. The first, including Chapters 1, 2, 3, and 4, presents some of the most important algorithms during the development of the interior-point method around the 1990s, most of them are widely known. The main purpose of this part is to explain the dilemma described above by analyzing these algorithms' polynomial bounds and summarizing the computational experience associated with them. The second part, including Chapters 5, 6, 7, and 8, describes how to solve the dilemma step-by-step using arc-search techniques. At the end of this part, a very efficient algorithm with the lowest polynomial bound is presented. The last part, including Chapters 9, 10, 11, and 12, extends arc-search techniques to some more general problems, such as convex quadratic programming, linear complementarity problem, and semi-definite programming.

Theory and Practice of Computation - Proceedings of the Workshop on Computation: Theory and Practice (WCTP 2019), September... Theory and Practice of Computation - Proceedings of the Workshop on Computation: Theory and Practice (WCTP 2019), September 26-27, 2019, Manila, The Philippines (Paperback)
Shin-ya Nishizaki, Masayuki Numao, Jaime Caro, Merlin Suarez
R1,794 Discovery Miles 17 940 Ships in 12 - 17 working days

This book provides a collection of papers from the Ninth Workshop on Computing: Theory and Practice, WCTP 2019 devoted to theoretical and practical approaches to computation, which was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, the University of the Philippines Diliman, and De La Salle University. The proceedings provide a broad overview of recent research trends in computer science research in Asia, particularly in these two countries. The papers included in the proceedings focus on both theoretical and practical aspects of computations, such as programming language theory, modeling of software systems, applications of machine learning, empathic computing, and various applications of information technology.

Data Science for Effective Healthcare Systems (Hardcover): Hari Singh, Ravindara Bhatt, Prateek Thakral, Dinesh Chander Verma Data Science for Effective Healthcare Systems (Hardcover)
Hari Singh, Ravindara Bhatt, Prateek Thakral, Dinesh Chander Verma
R3,395 Discovery Miles 33 950 Ships in 12 - 17 working days

Data Science for Effective Healthcare Systems has a prime focus on the importance of data science in the healthcare domain. Various applications of data science in the health care domain have been studied to find possible solutions. In this period of COVID-19 pandemic data science and allied areas plays a vital role to deal with various aspect of health care. Image processing, detection & prevention from COVID-19 virus, drug discovery, early prediction, and prevention of diseases are some thrust areas where data science has proven to be indispensable. Key Features: The book offers comprehensive coverage of the most essential topics, including: Big Data Analytics, Applications & Challenges in Healthcare Descriptive, Predictive and Prescriptive Analytics in Healthcare Artificial Intelligence, Machine Learning, Deep Learning and IoT in Healthcare Data Science in Covid-19, Diabetes, Coronary Heart Diseases, Breast Cancer, Brain Tumor The aim of this book is also to provide the future scope of these technologies in the health care domain. Last but not the least, this book will surely benefit research scholar, persons associated with healthcare, faculty, research organizations, and students to get insights into these emerging technologies in the healthcare domain.

Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback): Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa... Unity in Embedded System Design and Robotics - A Step-by-Step Guide (Paperback)
Ata Jahangir Moshayedi, Amin Kolahdooz, Liefa Liao
R2,624 Discovery Miles 26 240 Ships in 12 - 17 working days

the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project

Artificial Intelligence Techniques in IoT Sensor Networks (Paperback): Mohamed Elhoseny, Mohamed Abdel-Basset, K Shankar Artificial Intelligence Techniques in IoT Sensor Networks (Paperback)
Mohamed Elhoseny, Mohamed Abdel-Basset, K Shankar
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,499 Discovery Miles 54 990 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Unleashing the Art of Digital Forensics (Hardcover): Keshav Kaushik, Rohit Tanwar, Susheela Dahiya, Komal Kumar Bhatia, Yulei Wu Unleashing the Art of Digital Forensics (Hardcover)
Keshav Kaushik, Rohit Tanwar, Susheela Dahiya, Komal Kumar Bhatia, Yulei Wu
R3,996 Discovery Miles 39 960 Ships in 12 - 17 working days

Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: * Discusses the recent advancements in Digital Forensics and Cybersecurity * Reviews detailed applications of Digital Forensics for real-life problems * Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches * Includes case studies that will be helpful for researchers * Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. * Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.

A Comprehensive Guide to Information Security Management and Audit (Hardcover): Rajkumar Banoth, Gugulothu Narsimha, Aruna... A Comprehensive Guide to Information Security Management and Audit (Hardcover)
Rajkumar Banoth, Gugulothu Narsimha, Aruna Kranthi Godishala
R3,242 Discovery Miles 32 420 Ships in 12 - 17 working days

The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies

Teaching at Scale - Improving Access, Outcomes, and Impact Through Digital Instruction (Paperback): David Joyner Teaching at Scale - Improving Access, Outcomes, and Impact Through Digital Instruction (Paperback)
David Joyner
R1,091 Discovery Miles 10 910 Ships in 12 - 17 working days

Teaching at Scale explores the characteristics and parameters of large-scale online learning by identifying, in its perceived drawbacks, a wealth of educational opportunities in disguise. Scalable learning platforms have exploded in popularity over recent years, with MOOCS (massive open online courses), online degree programs, informal learning communities, and alternative credentials all drawing significant enrollments. But, as many educators are asking, are the challenges to delivering education at scale too great and the compromises too many? This book guides instructors to leverage their complex responsibilities-open-ended assessments at scale, individuated feedback to students, academic integrity in less controlled environments, and more-into significant assets. Informed by real-world institutional experience as well as key research in cognitive science and the learning sciences, each chapter provides practical strategies for educators and administrators seeking to solve problems and fulfill the high-quality, broad-access potential of large-scale instruction for lifelong learners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
English Insights 2
Jane Bailey, Paul Dummett, … Paperback R840 Discovery Miles 8 400
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, … Paperback  (3)
R1,337 R1,200 Discovery Miles 12 000
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,317 R1,179 Discovery Miles 11 790
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,207 R1,088 Discovery Miles 10 880
Systems Analysis And Design
Scott Tilley Hardcover R1,295 R1,163 Discovery Miles 11 630
Program Construction - Calculating…
Roland Backhouse Paperback R1,315 R1,177 Discovery Miles 11 770
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,200 R911 Discovery Miles 9 110
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, … Paperback R1,198 R1,075 Discovery Miles 10 750
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,265 R1,137 Discovery Miles 11 370
Security Awareness For Dummies
I Winkler Paperback R714 R507 Discovery Miles 5 070

 

Partners