0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (14)
  • R100 - R250 (583)
  • R250 - R500 (2,259)
  • R500+ (40,625)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Data Science Without Makeup - A Guidebook for End-Users, Analysts, and Managers (Hardcover): Mikhail Zhilkin Data Science Without Makeup - A Guidebook for End-Users, Analysts, and Managers (Hardcover)
Mikhail Zhilkin
R1,896 Discovery Miles 18 960 Ships in 12 - 17 working days

- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples

Technology and Tools in Engineering Education - Research and Innovations (Hardcover): Prathamesh P. Churi, Vishal Kumar, Utku... Technology and Tools in Engineering Education - Research and Innovations (Hardcover)
Prathamesh P. Churi, Vishal Kumar, Utku Kose, N. T. Rao
R3,253 Discovery Miles 32 530 Ships in 12 - 17 working days

Includes specific pedagogy used in engineering teaching Offers case studies and classroom practices used by engineering institutions Discusses innovative strategies used in lockdown days during COVID-19 pandemic Presents guidelines and comparisons on various national and international accreditation bodies Explores cost effective technologies and open source tools specifically used for low income educational institutions

Coaching Online - A Practical Guide (Hardcover): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Hardcover)
Kate Anthony, DeeAnna Merz Nagel
R3,978 Discovery Miles 39 780 Ships in 12 - 17 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Handbook of Machine Learning for Computational Optimization - Applications and Case Studies (Hardcover): Vishal Jain, Sapna... Handbook of Machine Learning for Computational Optimization - Applications and Case Studies (Hardcover)
Vishal Jain, Sapna Juneja, Abhinav Juneja, Ramani Kannan
R4,589 Discovery Miles 45 890 Ships in 12 - 17 working days

Focuses on new machine learning developments that can lead to newly developed applications Uses a predictive and futuristic approach which makes Machine Learning a promising tool for business processes and sustainable solutions Promotes newer algorithms which are more efficient and reliable for a new dimension in discovering certain latent domains of applications Discusses the huge potential in making better use of machines in order to ensure optimal prediction, execution, and decision-making Offers many real-time case studies

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R4,744 Discovery Miles 47 440 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R5,934 Discovery Miles 59 340 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,241 Discovery Miles 32 410 Ships in 12 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover): R. Indrakumari, Vijanth Sagayan Asirvadam, R.... Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover)
R. Indrakumari, Vijanth Sagayan Asirvadam, R. Lakshmana Kumar, B. Balusamy
R4,580 Discovery Miles 45 800 Ships in 12 - 17 working days

Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.

Big Data for Entrepreneurship and Sustainable Development (Hardcover): Mohammed El Amine Abdelli, Wissem Ajili-Ben Youssef,... Big Data for Entrepreneurship and Sustainable Development (Hardcover)
Mohammed El Amine Abdelli, Wissem Ajili-Ben Youssef, Ugur Oezgoeker, Imen Ben Slimene
R4,143 Discovery Miles 41 430 Ships in 12 - 17 working days

Discusses how entrepreneurs use big data to cut costs and minimize the waste of time Covers how using big data as a way to study competitors Offers how using big data can increase efficiency Presents how big data can improve the pricing of products Provides how big data is used to help increase sales and loyalty

Mapping Deathscapes - Digital Geographies of Racial and Border Violence (Hardcover): Suvendrini Perera, Joseph Pugliese Mapping Deathscapes - Digital Geographies of Racial and Border Violence (Hardcover)
Suvendrini Perera, Joseph Pugliese
R4,152 Discovery Miles 41 520 Ships in 12 - 17 working days

This interdisciplinary volume will be an important resource for scholars, students and activists working in the areas of Cultural Studies, Media and Visual Studies, Indigenous Studies, Refugee Studies and Law An international team of authors take a multidisciplinary approach to questions of race, geographies of state violence and countermaps of resistance across North America, Australia and Europe The book establishes rich lines of dialogic connection between digital and other media by incorporating both traditional scholarly resources and digital archives, databases, social media

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,906 Discovery Miles 19 060 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Introduction to Optimization-Based Decision-Making (Hardcover): Joao Luis De Miranda Introduction to Optimization-Based Decision-Making (Hardcover)
Joao Luis De Miranda
R2,654 Discovery Miles 26 540 Ships in 12 - 17 working days

Features Collects and discusses the ideas underpinning decision making through optimization tools in a simple and straightforward manner. Suitable for an undergraduate course in optimization-based decision making, or as a supplementary resource for courses in operations research and management science. Self-contained coverage of traditional and more modern optimization models, while not requiring a previous background in decision theory.

Systems Engineering - Fifty Lessons Learned (Paperback): Howard Eisner Systems Engineering - Fifty Lessons Learned (Paperback)
Howard Eisner
R679 Discovery Miles 6 790 Ships in 12 - 17 working days

The author has spent approximately 50 years in the field of systems engineering. This Focus book provides a "looking back" at his 50-year run and the lessons he learned and would like to share with other engineers, so they can use these lessons in their day-to-day work in systems engineering and related fields. The book is written from a systems engineering perspective. It offers 50 lessons learned working for a variety of different companies, which can be used across many other engineering fields. The book will be of interested to students and engineers across many fields, as well as students and engineers working in business and management fields.

Foundations of Computational Mathematics, Budapest 2011 (Paperback, New): Felipe Cucker, Teresa Krick, Allan Pinkus, Agnes... Foundations of Computational Mathematics, Budapest 2011 (Paperback, New)
Felipe Cucker, Teresa Krick, Allan Pinkus, Agnes Szanto
R1,463 Discovery Miles 14 630 Ships in 12 - 17 working days

The Foundations of Computational Mathematics meetings are a platform for cross-fertilisation between numerical analysis, mathematics and computer science. This volume is a collection of articles based on plenary presentations, given at the 2011 meeting, by some of the world's foremost authorities in computational mathematics. The topics covered reflect the breadth of research within the area as well as the richness of interactions between seemingly unrelated branches of pure and applied mathematics. As a result this volume will be of interest to researchers in the field of computational mathematics and also to non-experts who wish to gain some insight into the state of the art in this active and significant field.

The Power of Virtual Reality Cinema for Healthcare Training - A Collaborative Guide for Medical Experts and Media Professionals... The Power of Virtual Reality Cinema for Healthcare Training - A Collaborative Guide for Medical Experts and Media Professionals (Paperback)
John Bowditch, Eric R Williams
R1,418 Discovery Miles 14 180 Ships in 12 - 17 working days

Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.

Optimization with LINGO-18 - Problems and Applications (Hardcover): Neha Gupta, Irfan Ali Optimization with LINGO-18 - Problems and Applications (Hardcover)
Neha Gupta, Irfan Ali
R2,944 Discovery Miles 29 440 Ships in 12 - 17 working days

This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,381 Discovery Miles 33 810 Ships in 12 - 17 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Interpretation of Algebraic Inequalities - Practical Engineering Optimisation and Generating New Knowledge (Hardcover): Michael... Interpretation of Algebraic Inequalities - Practical Engineering Optimisation and Generating New Knowledge (Hardcover)
Michael Todinov
R2,330 Discovery Miles 23 300 Ships in 12 - 17 working days

1) Enables engineers to enhance system performance through interpreting algebraic inequalities. 2) Demonstrates how to optimise systems through mathematical modelling, aiding engineers in cost saving and weight reduction 3) Shows the clear link between mathematics and reality to aid engineers in practically applications of algebraic inequalities 4) Aids professional engineers in correctly mapping operating costs- correct application of the mathematics minimises the risk of underestimating costs and overestimating profits.

Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover): Andrew Jenkinson Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover)
Andrew Jenkinson
R3,242 Discovery Miles 32 420 Ships in 12 - 17 working days

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover)
Karl Cox
R3,983 Discovery Miles 39 830 Ships in 12 - 17 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback): Sara Smyth Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback)
Sara Smyth
R1,291 Discovery Miles 12 910 Ships in 12 - 17 working days

The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.

Mining Complex Networks (Hardcover): Bogumil Kaminski, Pawel Pralat, Francois Theberge Mining Complex Networks (Hardcover)
Bogumil Kaminski, Pawel Pralat, Francois Theberge
R2,643 Discovery Miles 26 430 Ships in 12 - 17 working days

This book concentrates on mining networks, a subfield within data science. Data science uses scientific and computational tools to extract valuable knowledge from large data sets. Once data is processed and cleaned, it is analyzed and presented to support decision-making processes. Data science and machine learning tools have become widely used in companies of all sizes. Networks are often large-scale, decentralized, and evolve dynamically over time. Mining complex networks aim to understand the principles governing the organization and the behavior of such networks is crucial for a broad range of fields of study. Here are a few selected typical applications of mining networks: Community detection (which users on some social media platforms are close friends). Link prediction (who is likely to connect to whom on such platforms). Node attribute prediction (what advertisement should be shown to a given user of a particular platform to match their interests). Influential node detection (which social media users would be the best ambassadors of a specific product). This textbook is suitable for an upper-year undergraduate course or a graduate course in programs such as data science, mathematics, computer science, business, engineering, physics, statistics, and social science. This book can be successfully used by all enthusiasts of data science at various levels of sophistication to expand their knowledge or consider changing their career path. Jupiter notebooks (in Python and Julia) accompany the book and can be accessed on https://www.ryerson.ca/mining-complex-networks/. These not only contain all the experiments presented in the book, but also include additional material. Bogumil Kaminski is the Chairman of the Scientific Council for the Discipline of Economics and Finance at SGH Warsaw School of Economics. He is also an Adjunct Professor at the Data Science Laboratory at Ryerson University. Bogumil is an expert in applications of mathematical modeling to solving complex real-life problems. He is also a substantial open-source contributor to the development of the Julia language and its package ecosystem. Pawel Pralat is a Professor of Mathematics in Ryerson University, whose main research interests are in random graph theory, especially in modeling and mining complex networks. He is the Director of Fields-CQAM Lab on Computational Methods in Industrial Mathematics in The Fields Institute for Research in Mathematical Sciences and has pursued collaborations with various industry partners as well as the Government of Canada. He has written over 170 papers and three books with 130 plus collaborators. Francois Theberge holds a B.Sc. degree in applied mathematics from the University of Ottawa, a M.Sc. in telecommunications from INRS and a PhD in electrical engineering from McGill University. He has been employed by the Government of Canada since 1996 where he was involved in the creation of the data science team as well as the research group now known as the Tutte Institute for Mathematics and Computing. He also holds an adjunct professorial position in the Department of Mathematics and Statistics at the University of Ottawa. His current interests include relational-data mining and deep learning.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,670 Discovery Miles 16 700 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Uncertainty Quantification in Variational Inequalities - Theory, Numerics, and Applications (Hardcover): Joachim Gwinner,... Uncertainty Quantification in Variational Inequalities - Theory, Numerics, and Applications (Hardcover)
Joachim Gwinner, Baasansuren Jadamba, Akhtar A. Khan, Fabio Raciti
R3,272 Discovery Miles 32 720 Ships in 12 - 17 working days

Features First book on uncertainty quantification in variational inequalities emerging from various network, economic, and engineering models. Completely self-contained and lucid in style Aimed for a diverse audience including applied mathematicians, engineers, economists, and professionals from academia Includes the most recent developments on the subject which so far have only been available in the research literature.

Deep Learning in Gaming and Animations - Principles and Applications (Hardcover): Vikas Chaudhary, Mool Chand Sharma, Prerna... Deep Learning in Gaming and Animations - Principles and Applications (Hardcover)
Vikas Chaudhary, Mool Chand Sharma, Prerna Sharma, Deevyankar Agarwal
R3,239 Discovery Miles 32 390 Ships in 12 - 17 working days

Discusses core concepts and principles of deep learning in gaming and animation with applications. Covers application of neural networks for intelligent video game character. Discusses automated video generation and real time animation. Covers technological advancements in virtual reality (VR), and augmented reality (AR).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,280 R1,147 Discovery Miles 11 470
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,317 R1,179 Discovery Miles 11 790
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,265 R1,137 Discovery Miles 11 370
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,207 R1,088 Discovery Miles 10 880
ITIL(R) 4 Essentials - Your essential…
Claire Agutter Paperback R1,057 Discovery Miles 10 570
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, … Paperback R1,198 R1,075 Discovery Miles 10 750
Close to the Machine (25th Anniversary…
Ellen Ullman Paperback R466 R382 Discovery Miles 3 820
DAMA-DMBOK - Data Management Body of…
DAMA International Paperback R2,668 R1,945 Discovery Miles 19 450
Systems Analysis And Design
Scott Tilley Hardcover R1,295 R1,163 Discovery Miles 11 630

 

Partners