Your cart is empty
Computer Concepts BASICS, 4E covers the most important computer literacy topics including computer hardware and software, application skills, keyboarding skills, the Internet, Web page creation, computer ethics and more.
This book presents original results on the leading edge of computer science research. Each article has been carefully selected in an attempt to present substantial research results across a broad spectrum. Topics discussed include the deformation of materials from macro- to nanoscale and numerical modeling; enabling end-to-end QoS guarantees in the next generation internet with service overlay networks; neuro-fuzzy systems for autonomous mobile robots; semantic technologies to model and control the composability of complex systems; load-distribution algorithm for grid computing with heterogeneous tasks; a hybrid approach for robot policy adaptation; using mobile web applications as a multi-platform mechanism to communicate users with embedded devices; genetic programming as a solver to challenging reinforcement learning problems; design and implementation of a system for interactive high-dimensional vector field visualization; and Routley-Star and informational interpretation.
Wireless sensor networks are an emerging technology with a wide range of applications in military and civilian domains. The book begins by detailing the basic principles and concepts of wireless sensor networks, including information gathering, energy management and the structure of sensory nodes. It proceeds to examine advanced topics, covering localisation, topology, security and evaluation of wireless sensor networks, highlighting international research being carried out in this area. Finally, it features numerous examples of applications of this technology to a range of domains, such as wireless, multimedia, underwater and underground wireless sensor networks. The concise but clear presentation of the important principles, techniques and applications of wireless sensor networks makes this guide an excellent introduction for anyone new to the subject, as well as an ideal reference for practitioners and researchers.
Every other day we hear about new ways to put deep learning to good use: improved medical imaging, accurate credit card fraud detection, long range weather forecasting, and more. PyTorch puts these superpowers in your hands, providing a comfortable Python experience that gets you started quickly and then grows with you as you, and your deep learning skills, become more sophisticated. Deep Learning with PyTorch teaches you how to implement deep learning algorithms with Python and PyTorch. This book takes you into a fascinating case study: building an algorithm capable of detecting malignant lung tumors using CT scans. As the authors guide you through this real example, you'll discover just how effective and fun PyTorch can be. Key features * Using the PyTorch tensor API * Understanding automatic differentiation in PyTorch * Training deep neural networks * Monitoring training and visualizing results * Interoperability with NumPy Audience Written for developers with some knowledge of Python as well as basic linear algebra skills. Some understanding of deep learning will be helpful, however no experience with PyTorch or other deep learning frameworks is required. About the technology PyTorch is a machine learning framework with a strong focus on deep neural networks. Because it emphasizes GPU-based acceleration, PyTorch performs exceptionally well on readily-available hardware and scales easily to larger systems. Eli Stevens has worked in Silicon Valley for the past 15 years as a software engineer, and the past 7 years as Chief Technical Officer of a startup making medical device software. Luca Antiga is co-founder and CEO of an AI engineering company located in Bergamo, Italy, and a regular contributor to PyTorch.
Provides an up-to-date analysis of big data and multi-agent systems The term Big Data refers to the cases, where data sets are too large or too complex for traditional data-processing software. With the spread of new concepts such as Edge Computing or the Internet of Things, production, processing and consumption of this data becomes more and more distributed. As a result, applications increasingly require multiple agents that can work together. A multi-agent system (MAS) is a self-organized computer system that comprises multiple intelligent agents interacting to solve problems that are beyond the capacities of individual agents. Modern Big Data Architectures examines modern concepts and architecture for Big Data processing and analytics. This unique, up-to-date volume provides joint analysis of big data and multi-agent systems, with emphasis on distributed, intelligent processing of very large data sets. Each chapter contains practical examples and detailed solutions suitable for a wide variety of applications. The author, an internationally-recognized expert in Big Data and distributed Artificial Intelligence, demonstrates how base concepts such as agent, actor, and micro-service have reached a point of convergence--enabling next generation systems to be built by incorporating the best aspects of the field. This book: Illustrates how data sets are produced and how they can be utilized in various areas of industry and science Explains how to apply common computational models and state-of-the-art architectures to process Big Data tasks Discusses current and emerging Big Data applications of Artificial Intelligence Modern Big Data Architectures: A Multi-Agent Systems Perspective is a timely and important resource for data science professionals and students involved in Big Data analytics, and machine and artificial learning.
This book develops a novel approach to perturbative quantum field theory: starting with a perturbative formulation of classical field theory, quantization is achieved by means of deformation quantization of the underlying free theory and by applying the principle that as much of the classical structure as possible should be maintained. The resulting formulation of perturbative quantum field theory is a version of the Epstein-Glaser renormalization that is conceptually clear, mathematically rigorous and pragmatically useful for physicists. The connection to traditional formulations of perturbative quantum field theory is also elaborated on, and the formalism is illustrated in a wealth of examples and exercises.
Learn what it takes to succeed in the the most in-demand tech job Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT professionals. Data science involves extracting, creating, and processing data to turn it into business value. With over 15 years of big data, predictive modeling, and business analytics experience, author Vincent Granville is no stranger to data science. In this one-of-a-kind guide, he provides insight into the essential data science skills, such as statistics and visualization techniques, and covers everything from analytical recipes and data science tricks to common job interview questions, sample resumes, and source code. The applications are endless and varied: automatically detecting spam and plagiarism, optimizing bid prices in keyword advertising, identifying new molecules to fight cancer, assessing the risk of meteorite impact. Complete with case studies, this book is a must, whether you're looking to become a data scientist or to hire one. * Explains the finer points of data science, the required skills, and how to acquire them, including analytical recipes, standard rules, source code, and a dictionary of terms * Shows what companies are looking for and how the growing importance of big data has increased the demand for data scientists * Features job interview questions, sample resumes, salary surveys, and examples of job ads * Case studies explore how data science is used on Wall Street, in botnet detection, for online advertising, and in many other business-critical situations Developing Analytic Talent: Becoming a Data Scientist is essential reading for those aspiring to this hot career choice and for employers seeking the best candidates.
Now updated--your expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge.
Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysisAccess control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systemsProtocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSMSoftware: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development.
Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
A solutions manual is available. Please email [email protected] to obtain it.
A systematic program design method can help developers ensure the correctness and performance of programs while minimizing the development cost. This book describes a method that starts with a clear specification of a computation and derives an efficient implementation by step-wise program analysis and transformations. The method applies to problems specified in imperative, database, functional, logic and object-oriented programming languages with different data, control and module abstractions. Designed for courses or self-study, this book includes numerous exercises and examples that require minimal computer science background, making it accessible to novices. Experienced practitioners and researchers will appreciate the detailed examples in a wide range of application areas including hardware design, image processing, access control, query optimization and program analysis. The last section of the book points out directions for future studies.
This book offers an overview of the key ideas of Petri nets, how they were developed, and how they were applied in diverse applications. The chapters in the first part offer individual perspectives on the impact of Petri's work. The second part of the book contains personal memories from researchers who collaborated with him closely, in particular they recount his unique personality. The chapters in the third part offer more conventional treatments on various aspects of current Petri net research, and the fourth part examines the wide applications of Petri nets, and the relationships with other domains. The editors and authors are the leading researchers in this domain, and this book will be a valuable insight for researchers in computer science, particularly those engaged with concurrency and distributed systems.
The breathtakingly rapid pace of change in computing makes it easy to overlook the pioneers who began it all. The Universal Computer: The Road from Leibniz to Turing explores the fascinating lives, ideas, and discoveries of seven remarkable mathematicians. It tells the stories of the unsung heroes of the computer age - the logicians.
Who are we, and how do we relate to each other? Luciano Floridi, one of the leading figures in contemporary philosophy, argues that the explosive developments in Information and Communication Technologies (ICTs) is changing the answer to these fundamental human questions. As the boundaries between life online and offline break down, and we become seamlessly connected to each other and surrounded by smart, responsive objects, we are all becoming integrated into an "infosphere". Personas we adopt in social media, for example, feed into our 'real' lives so that we begin to live, as Floridi puts in, "onlife". Following those led by Copernicus, Darwin, and Freud, this metaphysical shift represents nothing less than a fourth revolution. "Onlife" defines more and more of our daily activity - the way we shop, work, learn, care for our health, entertain ourselves, conduct our relationships; the way we interact with the worlds of law, finance, and politics; even the way we conduct war. In every department of life, ICTs have become environmental forces which are creating and transforming our realities. How can we ensure that we shall reap their benefits? What are the implicit risks? Are our technologies going to enable and empower us, or constrain us? Floridi argues that we must expand our ecological and ethical approach to cover both natural and man-made realities, putting the 'e' in an environmentalism that can deal successfully with the new challenges posed by our digital technologies and information society.
This textbook discusses the most fundamental and puzzling questions about the foundations of computing. In 23 lecture-sized chapters it provides an exciting tour through the most important results in the field of computability and time complexity, including the Halting Problem, Rice's Theorem, Kleene's Recursion Theorem, the Church-Turing Thesis, Hierarchy Theorems, and Cook-Levin's Theorem. Each chapter contains classroom-tested material, including examples and exercises. Links between adjacent chapters provide a coherent narrative. Fundamental results are explained lucidly by means of programs written in a simple, high-level imperative programming language, which only requires basic mathematical knowledge. Throughout the book, the impact of the presented results on the entire field of computer science is emphasised. Examples range from program analysis to networking, from database programming to popular games and puzzles. Numerous biographical footnotes about the famous scientists who developed the subject are also included. "Limits of Computation" offers a thorough, yet accessible, introduction to computability and complexity for the computer science student of the 21st century.
Do you want to create data analysis reports without writing a line of code? This book introduces SAS Studio, a free data science web browser-based product for educational and non-commercial purposes. The power of SAS Studio comes from its visual point-and-click user interface that generates SAS code. It is easier to learn SAS Studio than to learn R and Python to accomplish data cleaning, statistics, and visualization tasks. The book includes a case study about analyzing the data required for predicting the results of presidential elections in the state of Maine for 2016 and 2020. In addition to the presidential elections, the book provides real-life examples including analyzing stocks, oil and gold prices, crime, marketing, and healthcare. You will see data science in action and how easy it is to perform complicated tasks and visualizations in SAS Studio. You will learn, step-by-step, how to do visualizations, including maps. In most cases, you will not need a line of code as you work with the SAS Studio graphical user interface. The book includes explanations of the code that SAS Studio generates automatically. You will learn how to edit this code to perform more complicated advanced tasks. The book introduces you to multiple SAS products such as SAS Viya, SAS Analytics, and SAS Visual Statistics. What You Will Learn Become familiar with SAS Studio IDE Understand essential visualizations Know the fundamental statistical analysis required in most data science and analytics reports Clean the most common data set problems Use linear progression for data prediction Write programs in SAS Get introduced to SAS-Viya, which is more potent than SAS studio Who This Book Is For A general audience of people who are new to data science, students, and data analysts and scientists who are experienced but new to SAS. No programming or in-depth statistics knowledge is needed.
With everything readers need to know about how to execute their research project, this book is written specifically for information systems (IS) and computing students. It introduces key quantitative and qualitative research methods, makes sense of underlying philosophies, and will help readers navigate and assess existing published academic papers. Special features support students as they bridge the gap between theory and practice. These include: Research examples from the IS and computing disciplines Suggestions on how to build internet research into each method An explanation of how knowledge is created, drawing an analogy between this and the creation of software systems Throughout readers are supported by pedagogical features such as learning objectives, explanations, discussion questions, evaluation guides and suggestions for further reading. Masters and PhD students and advanced undergraduates should look no further than this text book when embarking on a research project.
"BioCoder" is a quarterly newsletter for DIYbio, synthetic bio, and anything related. You ll discover: Articles about interesting projects and experiments, such as the glowing plantArticles about tools, both those you buy and those you buildVisits to DIYbio laboratoriesProfiles of key people in the communityAnnouncements of events and other items of interestSafety pointers and tips about good laboratory practiceAnything that s interesting or useful: you tell us!And "BioCoder" is free (for the time being), unless you want a dead-tree version. We d like "BioCoder" to become self supporting (maybe even profitable), but we ll worry about that after we ve got a few issues under our belt.If you d like to contribute, send email to [email protected] Tell us what you d like to do, and we ll get you started."
Introduce IT technical support as best-selling authors and educators Andrews, West and Dark explain how to work with users as well as install, maintain, secure and troubleshoot software in COMPTIA A+ CORE 2 EXAM: GUIDE TO OPERATING SYSTEMS AND SECURITY, 10E. This step-by-step, highly visual approach uses CompTIA A+ Exam objectives as a framework to prepare students for the 220-1002 certification exam. Extensive updates reflect the most current technology, techniques and industry standards in IT support. Each chapter covers core and advanced topics with an emphasis on practical application and learning by doing. Additional coverage explores the latest developments in security, Active Directory, operational procedures, the basics of scripting, mobile operating systems, virtualization, remote support and Windows 10. In addition, Lab Manuals, CourseNotes, online labs and optional MindTap online resources provide certification test prep and interactive activities to prepare future IT support technicians.
This book presents original results on the leading edge of computer science research. Each article has been carefully selected in an attempt to present substantial research results across a broad spectrum. Topics discussed include coverage and intrusion detection in wireless sensor networks; computer networks, the internet, and green IT; security in wireless sensor networks; performance of a tree routing topology for wireless sensor networks using different platforms; location estimation in modern mobile computing environments; towards a gender-focused programming performance model; methodologies and processes language for the software industry; design of Luria memory test for older adults on mobile devices; synchronizing nods of a computer-generated character and a speaker using thermal image processing; evaluation of effective parameters of energy consumption in wireless sensor networks; computer aided-thermal module design; and a high performance hybrid FAT32 file system.
This book represents a modern and realistic approach to systems development methodologies by examining the usage of such methodologies in practice. It is now accepted that methodologies are not often followed as prescibed in practice. This book explains why this is so, and describes the extent and nature of thier usage.The book covers the emergence and evolution of systems development methodologies, and descibes and anaysis the methodologies in detail. It presents the pros and cons of the use of methodologies and provides empirical evidence on thier actual use.
Mobile phones are close to ubiquitous in developing countries; Internet and broadband access are becoming commonplace. Information and communication technologies (ICTs) thus represent the fastest, broadest and deepest technical change experienced in international development. They now affect every development sector - supporting the work of hundreds of millions of farmers and micro-entrepreneurs; creating millions of ICT-based jobs; assisting healthcare workers and teachers; facilitating political change; impacting climate change; but also linked with digital inequalities and harms - with the pace of change continuously accelerating. Information and Communication Technology for Development (ICT4D) provides the first dedicated textbook to examine and explain these emerging phenomena. It will help students, practitioners, researchers and other readers understand the place of ICTs within development; the ICT-enabled changes already underway; and the key issues and interventions that engage ICT4D practice and strategy. The book has a three-part structure. The first three chapters set out the foundations of ICT4D: the core relation between ICTs and development; the underlying components needed for ICT4D to work; and best practice in implementing ICT4D. Five chapters then analyse key development goals: economic growth, poverty eradication, social development, good governance and environmental sustainability. Each chapter assesses the goal-related impact associated with ICTs and key lessons from real-world cases. The final chapter looks ahead to emerging technologies and emerging models of ICT-enabled development. The book uses extensive in-text diagrams, tables and boxed examples with chapter-end discussion and assignment questions and further reading. Supported by online activities, video links, session outlines and slides, this textbook provides the basis for undergraduate, postgraduate and online learning modules on ICT4D.
Offering a deep insight into the venture capital deal-making process, "Raising Venture Capital" also provides valuable introduction to the subject. The book is practical in focus but based on sound academic theory, research and teaching materials gathered over the last 4 years at Tanaka Business School.
Part one covers the history of the venture capital industry, shows why entrepreneurs need venture capital finance, and looks at how venture capitals raise and structure their funds. It also covers valuation methods for venture capital investments, and portfolio management.
Part two illustrates how successful entrepreneurs raise finance from venture capitals, and gives details on how to approach venture capitals, how to choose the right venture capital firm, and how venture capitals and entrepreneurs work together after the deal is done.
Part three gives a blow-by-blow account of the structure of a venture capital deal.
Support your teaching of the new Cambridge Technicals 2016 suite with Cambridge Technical Level 3 IT, developed in partnership between OCR and Hodder Education; this textbook covers each specialist pathway and ensures your ability to deliver a flexible course that is both vocationally focused and academically thorough. Cambridge Technical Level 3 IT is matched exactly to the new specification and follows specialist pathways in IT Infrastructure Technician, Emerging Digital Technology Practitioner, Application Developer, and Data Analyst. - Ensures effective teaching of each specialist pathway offered within the qualification. - Focuses learning on the skills, knowledge and understanding demanded from employers and universities. - Provides ideas and exercises for the application of practical skills and knowledge. - Developed in partnership between Hodder Education and OCR, guaranteeing quality resources which match the specification perfectly
This book integrates the foundations of quantum computing with a hands-on coding approach to this emerging field; it is the first work to bring these strands together in an updated manner. This work is suitable for both academic coursework and corporate technical training. This volume comprises three books under one cover: Part I outlines the necessary foundations of quantum computing and quantum circuits. Part II walks through the canon of quantum computing algorithms and provides code on a range of quantum computing methods in current use. Part III covers the mathematical toolkit required to master quantum computing. Additional resources include a table of operators and circuit elements and a companion GitHub site providing code and updates. Jack D. Hidary is a research scientist in quantum computing and in AI at Alphabet X, formerly Google X. "Quantum Computing will change our world in unexpected ways. Everything technology leaders, engineers and graduate students need is in this book including the methods and hands-on code to program on this novel platform." -Eric Schmidt, PhD, Former Chairman and CEO of Google; Founder, Innovation Endeavors
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback
Data Structures Using C++
D. Malik Paperback
Introduction to Computer Theory
Daniel I. A. Cohen Paperback (4)
R5,288 Discovery Miles 52 880
C# Programming - From Problem Analysis…
Barbara Doyle Paperback
Numerical Recipes Source Code CD-ROM 3rd…
William H. Press, Saul A. Teukolsky, … CD-ROM
Machine Learning For Dummies
John Paul Mueller, Luca Massaron Paperback
Information Technology for Management…
Efraim Turban, Carol Pollard, … Paperback R1,200 Discovery Miles 12 000
Python for Algorithmic Trading - From…
Yves Hilpisch Paperback
Systems Analysis and Design in a…
John W. Satzinger, Robert Jackson, … Hardcover (1)
Principles of Business Information…
Ralph M. Stair Paperback (1)