0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (10)
  • R100 - R250 (584)
  • R250 - R500 (2,213)
  • R500+ (30,951)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Social, Managerial, and Organizational Dimensions of Enterprise Information Systems (Hardcover): Maria Manuela Cruz Cunha Social, Managerial, and Organizational Dimensions of Enterprise Information Systems (Hardcover)
Maria Manuela Cruz Cunha
R4,949 Discovery Miles 49 490 Ships in 12 - 17 working days

Enterprise information systems touch every process of an organization as new functionalities in previously existing and upcoming solutions are created every day. ""Social, Managerial, and Organizational Dimensions of Enterprise Information Systems"" discusses the technological developments, main issues, challenges, opportunities, and trends impacting every part of small to medium sized enterprises. A leading resource for academicians, managers, and researchers, this advanced publication provides an integrated and progressive view into the benefits and applications of enterprise information systems.

Technologies for Migration and Population Analysis - Spatial Interaction Data Applications (Hardcover): Technologies for Migration and Population Analysis - Spatial Interaction Data Applications (Hardcover)
R4,911 Discovery Miles 49 110 Ships in 12 - 17 working days

Internal migration serves as one of the key contributing factors to population change involving not only change in the numbers of people, but also a change in composition and structure of local populations. Technologies for Migration and Population Analysis: Spatial Interaction Data Applications addresses the technical and data-related side of studying population flows and provides a selection of substantive case studies and applications to exemplify research currently being carried out. With expert international contributors currently working in the field, this authoritative book allows readers to better understand interaction data and ways knowledge of population flows can be put to use.

Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover): Paulo Carreira, Vasco Amaral, Hans Vangheluwe Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover)
Paulo Carreira, Vasco Amaral, Hans Vangheluwe
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days
E-learning Methodologies and Computer Applications in Archaeology (Hardcover, New): Dionysios Politis E-learning Methodologies and Computer Applications in Archaeology (Hardcover, New)
Dionysios Politis
R4,929 Discovery Miles 49 290 Ships in 12 - 17 working days

Tools of data comparison and analysis are critical in the field of archaeology, and the integration of technological advancements such as geographic information systems, intelligent systems, and virtual reality reconstructions with the teaching of archaeology is crucial to the effective utilization of resources in the field. ""E-Learning Methodologies and Computer Applications in Archaeology"" presents innovative instructional approaches for archaeological e-learning based on networked technologies, providing researchers, scholars, and professionals a comprehensive global perspective on the resources, development, application, and implications of information communication technology in multimedia-based educational products and services in archaeology.

Advances in Computational Biology, Volume 2 (Hardcover, 2nd edition): H. O. Villar Advances in Computational Biology, Volume 2 (Hardcover, 2nd edition)
H. O. Villar
R2,791 Discovery Miles 27 910 Ships in 12 - 17 working days

The second volume in a series which aims to focus on advances in computational biology. This volume discusses such topics as: statistical analysis of protein sequences; progress in large-scale sequence analysis; and the architecture of loops in proteins.

Encyclopedia of Information Science and Technology (3rd Edition) Vol 1 (Hardcover): Mehdi Khosrowpour Encyclopedia of Information Science and Technology (3rd Edition) Vol 1 (Hardcover)
Mehdi Khosrowpour
R12,914 Discovery Miles 129 140 Ships in 10 - 15 working days
Nature-Inspired Computing - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Nature-Inspired Computing - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,235 Discovery Miles 102 350 Ships in 10 - 15 working days
Social Interactive Television - Immersive Shared Experiences and Perspectives (Hardcover): Pablo Cesar, David Geerts,... Social Interactive Television - Immersive Shared Experiences and Perspectives (Hardcover)
Pablo Cesar, David Geerts, Konstantinos Chorianopoulos
R5,303 Discovery Miles 53 030 Ships in 12 - 17 working days

Television, since its invention, has been considered to be a social link between people. Continually enhanced by innovation, the next frontier for this technological phenomenon will focus on the actual natural capabilities of the medium. Social Interactive Television: Immersive Shared Experiences and Perspectives combines academic and industry research to provide the first publication of its kind to discuss the future emergence of experiences and services through interactive television. Concentrating on system and interaction design, as well as evaluation methods that focus on social experiences around interactive television, this book provides practitioners, academicians, researchers, and developers with the most relevant, current, and interesting findings on the topic.

Design, Applications, and Maintenance of Cyber-Physical Systems (Hardcover): Pierluigi Rea, Erika Ottaviano, Jose Machado,... Design, Applications, and Maintenance of Cyber-Physical Systems (Hardcover)
Pierluigi Rea, Erika Ottaviano, Jose Machado, Katarzyna Antosz
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Cyber-physical systems (CPS) can be defined as systems in which physical objects are represented in the digital world and integrated with computation, storage, and communication capabilities and are connected to each other in a network. The goal in the use of the CPS is integrating the dynamics of the physical processes with those of the software and networking, providing abstractions and modelling, design, and analysis techniques for the integrated whole. The notion of CPS is linked to concepts of robotics and sensor networks with intelligent systems proper of computational intelligence leading the pathway. Recent advances in science and engineering improve the link between computational and physical elements by means of intelligent systems, increasing the adaptability, autonomy, efficiency, functionality, reliability, safety, and usability of cyber-physical systems. The potential of cyber-physical systems will spread to several directions, including but not limited to intervention, precision manufacturing, operations in dangerous or inaccessible environments, coordination, efficiency, Maintenance 4.0, and augmentation of human capabilities. Design, Applications, and Maintenance of Cyber-Physical Systems gives insights about CPS as tools for integrating the dynamics of the physical processes with those of software and networking, providing abstractions and modelling, design, and analysis techniques for their smart manufacturing interoperation. The book will have an impact upon the research on robotics, mechatronics, integrated intelligent multibody systems, Industry 4.0, production systems management and maintenance, decision support systems, and Maintenance 4.0. The chapters discuss not only the technologies involved in CPS but also insights into how they are used in various industries. This book is ideal for engineers, practitioners, researchers, academicians, and students who are interested in a deeper understanding of cyber-physical systems (CPS), their design, application, and maintenance, with a special focus on modern technologies in Industry 4.0 and Maintenance 4.0.

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover): Bryan Jeffrey Parno Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover)
Bryan Jeffrey Parno
R2,160 Discovery Miles 21 600 Ships in 10 - 15 working days

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Handbook of Reconfigurable Computing: Volume II (Hardcover): Akira Hanako Handbook of Reconfigurable Computing: Volume II (Hardcover)
Akira Hanako
R3,022 Discovery Miles 30 220 Ships in 12 - 17 working days
The Silence of Slime Mould (Hardcover): Andrew Adamatzky The Silence of Slime Mould (Hardcover)
Andrew Adamatzky
R595 Discovery Miles 5 950 Ships in 12 - 17 working days
Bioinformation Worlds and Futures (Hardcover): EJ Gonzalez-Polledo, Silvia Posocco Bioinformation Worlds and Futures (Hardcover)
EJ Gonzalez-Polledo, Silvia Posocco
R4,012 Discovery Miles 40 120 Ships in 12 - 17 working days

This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.

Conversations About Physics Volume 1 (Hardcover): Howard Burton Conversations About Physics Volume 1 (Hardcover)
Howard Burton
R876 Discovery Miles 8 760 Ships in 10 - 15 working days
Handbook of Reconfigurable Computing: Volume I (Hardcover): Akira Hanako Handbook of Reconfigurable Computing: Volume I (Hardcover)
Akira Hanako
R3,022 Discovery Miles 30 220 Ships in 12 - 17 working days
Python Machine Learning - the complete beginner's guide to deep learning with python. Learn to use scikit-learn and... Python Machine Learning - the complete beginner's guide to deep learning with python. Learn to use scikit-learn and pandas. (Hardcover)
Willard D Sanders
R649 R582 Discovery Miles 5 820 Save R67 (10%) Ships in 10 - 15 working days
Virtual Teams - Projects, Protocols and Processes (Hardcover): David Pauleen Virtual Teams - Projects, Protocols and Processes (Hardcover)
David Pauleen
R2,250 Discovery Miles 22 500 Ships in 12 - 17 working days

Virtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters featuring practical research, insight and recommendations on how virtual team projects can be better managed, as well as in depth discussion on issues critical to virtual team success, including the place of virtual teams in organizations, leadership, trust and relationship building, best use of technology, and knowledge sharing.

Embracing Interference in Wireless Systems (Hardcover): Shyamnath Gollakota Embracing Interference in Wireless Systems (Hardcover)
Shyamnath Gollakota
R2,160 Discovery Miles 21 600 Ships in 10 - 15 working days

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

Information and Communication Technologies in Support of the Tourism Industry (Hardcover): Wayne Pease, Michelle Rowe, Malcolm... Information and Communication Technologies in Support of the Tourism Industry (Hardcover)
Wayne Pease, Michelle Rowe, Malcolm Cooper
R3,001 R2,782 Discovery Miles 27 820 Save R219 (7%) Ships in 12 - 17 working days

Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. ""Information and Communication Technologies in Support of the Tourism Industry"" examines the process of transformation as it relates to the tourism industry, and the changes to that industry from modern electronic communications. ""Information and Communication Technologies in Support of the Tourism Industry"" covers not only geographically supportive technologies in communication, but also in terms of culture, economics, marketing, social, and regional issues. In-depth analyses range from the use of the Internet to supply information to the emerging patterns of tourist decision making and investments.

Handbook of Radio Frequency Identification (Hardcover): Kevin Merriman Handbook of Radio Frequency Identification (Hardcover)
Kevin Merriman
R2,164 Discovery Miles 21 640 Ships in 12 - 17 working days
Exploring Critical Approaches of Evolutionary Computation (Hardcover): Muhammad Sarfraz Exploring Critical Approaches of Evolutionary Computation (Hardcover)
Muhammad Sarfraz
R5,819 Discovery Miles 58 190 Ships in 12 - 17 working days

Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.

Disconnected - How to Deliver Realness, Meaning, and Belonging at Work (Hardcover): Colleen McFarland Disconnected - How to Deliver Realness, Meaning, and Belonging at Work (Hardcover)
Colleen McFarland
R720 R642 Discovery Miles 6 420 Save R78 (11%) Ships in 10 - 15 working days
Magnetic Core Memory Decoded (Hardcover): J.S. Walker Magnetic Core Memory Decoded (Hardcover)
J.S. Walker
R974 Discovery Miles 9 740 Ships in 12 - 17 working days
Microsoft Windows 10 Tips & Tricks (Fold-out book or chart): Joan Lambert Microsoft Windows 10 Tips & Tricks (Fold-out book or chart)
Joan Lambert
R234 Discovery Miles 2 340 Ships in 12 - 17 working days

Get the most out of your computer with our quick and easy 6-page laminated guide focusing on configuration and management of your system for you, with guidance for setting up and securing other users that may use your computer. Joan Lambert, author of multiple books on the Microsoft Office Suite, creator of many Lynda.com videos and an experienced corporate trainer used her experience and knowledge to cover the most relevant functions for users at different levels. Suggested uses: Workplace -- easy access at a moments notice to find a function you need to use; Company Training -- reduce help-desk calls and keep productivity flowing for a team or for your entire company; Family & Shared -- admin and set up secure family accounts to keep things separated while controlling time spent on the computer; Students/Teachers/Parents -- help with the learning curve in a classroom or at home; College Students -- make sure you are set-up, secure and using features that can make your life easier.

Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,721 Discovery Miles 97 210 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
French Dive - Living More with Less in…
Eric Freeze Hardcover R687 Discovery Miles 6 870
Kaiju No. 8, Vol. 2
Naoya Matsumoto Paperback R222 R195 Discovery Miles 1 950
Korean Mythology - Captivating Myths…
Matt Clayton Hardcover R630 R568 Discovery Miles 5 680
Dirty Trunks
Strange Nation CD R378 Discovery Miles 3 780
Strategic Marketing
J.A. Wiid, M C Cant Paperback R540 R512 Discovery Miles 5 120
Dala Glass Glaze - 6 Olive (1L) - Water…
R512 Discovery Miles 5 120
Handbook of Neuropsychology, 2nd…
Sidney Segalowitz Hardcover R5,600 Discovery Miles 56 000
Pebeo Vitrail - Orange (45ml)
R225 Discovery Miles 2 250
Family Fun - Activities with your…
Lisa McNamara Paperback R50 R47 Discovery Miles 470
The Labour Governments 1964-1970 Volume…
Steven Fielding Paperback R646 Discovery Miles 6 460

 

Partners