Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing > General
Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.
This textbook intends to be a comprehensive and substantially self-contained two-volume book covering performance, reliability, and availability evaluation subjects. The volumes focus on computing systems, although the methods may also be applied to other systems. The first volume covers Chapter 1 to Chapter 14, whose subtitle is ``Performance Modeling and Background". The second volume encompasses Chapter 15 to Chapter 25 and has the subtitle ``Reliability and Availability Modeling, Measuring and Workload, and Lifetime Data Analysis". This text is helpful for computer performance professionals for supporting planning, design, configuring, and tuning the performance, reliability, and availability of computing systems. Such professionals may use these volumes to get acquainted with specific subjects by looking at the particular chapters. Many examples in the textbook on computing systems will help them understand the concepts covered in each chapter. The text may also be helpful for the instructor who teaches performance, reliability, and availability evaluation subjects. Many possible threads could be configured according to the interest of the audience and the duration of the course. Chapter 1 presents a good number of possible courses programs that could be organized using this text. Volume I is composed of the first two parts, besides Chapter 1. Part I gives the knowledge required for the subsequent parts of the text. This part includes six chapters. It covers an introduction to probability, descriptive statistics and exploratory data analysis, random variables, moments, covariance, some helpful discrete and continuous random variables, Taylor series, inference methods, distribution fitting, regression, interpolation, data scaling, distance measures, and some clustering methods. Part II presents methods for performance evaluation modeling, such as operational analysis, Discrete-Time Markov Chains (DTMC), and Continuous Time Markov Chains (CTMC), Markovian queues, Stochastic Petri nets (SPN), and discrete event simulation.
Helping you understand the technological foundations for a wide range of digital devices, New Perspectives Computer Concepts Comprehensive, 21st edition, presents what every learner should know about using technology to complete your education, launch a successful career and engage in issues that shape today's world. The book's proven learning path is structured with today's busy reader in mind. Leading tech author June Parsons combines the latest on emerging technology with detailed illustrations and interactive activities that help you quickly understand technical topics. This edition provides updated information on current operating systems, digital rights management, the deep web and dark web, videoconferencing, the pandemic's impact on tech jobs, work-at-home and more. A unique module provides a hands-on introduction to programming, while MindTap offers anywhere, anytime learning solutions.
This book, about a newly emerging area of research in instructional
technology, has as its title the acronym "CSCL." Initially, CSCL
was chosen as an acronym for Computer-Supported Collaborative
Learning. However, some would argue that "collaborative" is often
not a descriptive term for what learners do in instructional
settings; further, as the field develops, the technology used to
support collaboration may not always involve computers, at least
not in the direct ways they have been used to support instruction
in the past. To avoid getting bogged down in this terminological
debate, this book uses CSCL as a designation in its own right,
leaving open to interpretation precisely what words it stands for.
Conducting computer analyses for the purposes of revealing
information of significance to the press represents an extension of
one of the most important forms of American journalism into the
contemporary era of new technologies. Investigative reporting had
its start with the establishment of the metropolitan newspaper
during the early decades of the 1900s. At the time, it was a
continuation of the evolving tradition of freedom of the press that
had characterized American political life since colonial times. As
it developed, investigative reporting stressed "facts" rather than
the opinions of the editor or reporter. In turn, that tradition had
its own intellectual roots. Today, computer-assisted investigative
reporting (CAIR) extends that "marketplace of ideas" into
systematic examinations of the electronic records of government. In
addition, computer analyses of other kinds of information
systematically gathered by journalists can provide the press with
insights into trends and patterns unlikely to be revealed by other
means.
Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
The advent of very compact, very powerful digital computers has
made it possible to automate a great many processes that formerly
required large, complex machinery. Digital computers have made
possible revolutionary changes in industry, commerce, and
transportation. This book, an expansion and revision of the
author's earlier technical papers on this subject, describes the
development of automation in aircraft and in the aviation system,
its likely evolution in the future, and the effects that these
technologies have had -- and will have -- on the human operators
and managers of the system. It suggests concepts that may be able
to enhance human-machine relationships in future systems. The
author focuses on the ability of human operators to work
cooperatively with the constellation of machines they command and
control, because it is the "interactions among" these system
elements that result in the system's success or failure, whether in
aviation or elsewhere.
This is a thorough description of this increasingly important technology, starting from the development of head-up displays (HUDs), particularly specifications and standards and operational problems associated with HUD use. HUD involvement in spatial disorientation and its use in recognizing and recovering from unusual attitudes is discussed. The book summarizes the design criteria including hardware, software, interface and display criteria. It goes on to outline flight tasks to be used for evaluating HUDs and discusses the impact of HUDs on flight training. Recent work indicates that a HUD may allow a significant reduction in the time required to train a pilot on a particular aircraft, even considering non-HUD-related tasks. The author concludes with a review of unresolved HUD issues and recommendations for further research and provides an impressive bibliography, glossary and index. Within the military aviation sector the book will be of use to industry, research agencies, test pilot schools and air force training establishments. In the civil area regulatory authorities, airlines and industry will also have an increasing interest.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
The Universal Service Desk (USD) - Implementing, controlling and improving service delivery defines what a USD is, why it is valuable to an organisation and how to build and implement one. It also discusses the evolution of the USD as part of integrated workplace management. Understand the essentials of any USD - buy this book today!
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market. Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package. The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distributed computing in simple terms Includes substantial vendor/tool material, especially for open source decisions Covers prominent software packages, including Hadoop and Oracle Endeca Examines GIS and machine learning applications Considers privacy and surveillance issues The book further explores basic statistical concepts that, when misapplied, can be the source of errors. Time and again, big data is treated as an oracle that discovers results nobody would have imagined. While big data can serve this valuable function, all too often these results are incorrect, yet are still reported unquestioningly. The probability of having erroneous results increases as a larger number of variables are compared unless preventative measures are taken. The approach taken by the authors is to explain these concepts so managers can ask better questions of their analysts and vendors as to the appropriateness of the methods used to arrive at a conclusion. Because the world of science and medicine has been grappling with similar issues in the publication of studies, the authors draw on their efforts and apply them to big data.
Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind
Geographic information system (GIS) computer technology is
revolutionizing the way we interact with information. Data, text,
drawings, maps, and images contain information that can be accessed
and used intuitively through drawings containing graphical
representations of the facilities to which they apply, e.g.,
emission stacks, sampling locations, and sites, to name only a few
examples.
As increasing numbers of social anthropoloists use computers for wordprocessing, interest in other applications inevitably follows. "Applications in Computing for Social Anthropologists" addresses this interest and encourages researchers to make full use of their computers to help them organize data. Firstly, the author discusses computing applications in relation to research activities shared by all anthropologists - ethnographic fieldwork, management and analysis of footnotes and the use of visual and aural material. The book then illustrates the way in which computer-based representations can satisfy the requirements of anthropological methods with a detailed examination of representing kinship relations in an original way. Nal developments in the representation of visual and aural data on computers, as well as possible applications of knowledge based models are also introduced.
Statistical distributions are important tools to model the characteristics of data sets such as right or left skewness, bi-modality or multi-modality observed in different applied sciences such as engineering, medicine, and finance, among others. The well-known distributions such as normal, Weibull, gamma, Lindley are extensively used because of their simple forms and identifiability properties. However, mostly in the last decade or so, researchers have focused on the more complex and flexible distributions, referred to as Generalized or simply G families of distributions to increase the modeling ability of these distributions by adding one or more shape parameters. The main aim of this edited book is to present new development currently made by various researchers in the field of G families of contributions distributions. The book will help future and current researchers in the field of this research. Some of the objectives are listed below: Develop new univariate continuous and discrete G families of probability distributions. Develop new bivariate continuous and discrete G families of probability distributions. Derive useful mathematical properties such as, ordinary and incomplete moments, moments generating functions, residual life and reversed residual life functions, order statistics, quantile spread ordering and entropies, among others and some bivariate and multivariate extensions of the new and existing models using a simple type copula such as: Farlie Gumbel Morgenstern copula. Modified Farlie Gumbel Morgenstern copula. Clayton copula. Renyi entropy copula. Ali-Mikhail-Haq copula. haracterize the models via several techniques such as: the conditional expectation. the truncated moment. the hazard functions. Mills ratio. certain functions of the random variable. the 1st order statistic. the conditional expectation of the record values. Assess the performance of the used estimation methods via Monte-Carlo simulation studies. Show the wide importance and the flexibility of the new models against the competitive models. Construct some new regression models based on the new proposed G families and use in statistical prediction. Application of many new useful goodness-of-fit tests for right censored validation such as the Nikulin-Rao-Robson goodness-of-fit test, modified Nikulin-Rao-Robson goodness-of-fit test, Bagdonavicius-Nikulin goodness-of-fit test and modified Bagdonavicius-Nikulin goodness-of-fit test to the new families.
Python is an amazing programming language. It can be applied to almost any programming task. It allows for rapid development and debugging. Getting started with Python is like learning any new skill: it's important to find a resource you connect with to guide your learning. Luckily, there's no shortage of excellent books that can help you learn both the basic concepts of programming and the specifics of programming in Python. With the abundance of resources, it can be difficult to identify which book would be best for your situation. Python for Beginners is a concise single point of reference for all material on python. * Provides concise, need-to-know information on Python types and statements, special method names, built-in functions and exceptions, commonly used standard library modules, and other prominent Python tools * Offers practical advice for each major area of development with both Python 3.x and Python 2.x * Based on the latest research in cognitive science and learning theory * Helps the reader learn how to write effective, idiomatic Python code by leveraging its best-and possibly most neglected-features This book focuses on enthusiastic research aspirants who work on scripting languages for automating the modules and tools, development of web applications, handling big data, complex calculations, workflow creation, rapid prototyping, and other software development purposes. It also targets graduates, postgraduates in computer science, information technology, academicians, practitioners, and research scholars.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Discussing career decision making (CDM), career guidance, a
computerized system of career guidance, and the interplay among
them, this book describes the way people sort themselves, or are
sorted, into educational and occupational options. The options
represent the content of this book, and the sorting represents the
process. The sequence of decisions may extend over a lifetime, but
several crucial choice-points tend to occur at predictable stages
in a career. Career guidance is a professional intervention in CDM;
"professional" implies that practitioners conform to a standard of
ethics, knowledge, and competence beyond what may be offered by
other intervenors. Guidance is partly an art, but it is also partly
a science -- at least an application of science, based on a
synthesis of logic and evidence derived from research.
Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.
This book offers a comprehensive introduction to seven commonly used image understanding techniques in modern information technology. Readers of various levels can find suitable techniques to solve their practical problems and discover the latest development in these specific domains. The techniques covered include camera model and calibration, stereo vision, generalized matching, scene analysis and semantic interpretation, multi-sensor image information fusion, content-based visual information retrieval, and understanding spatial-temporal behavior. The book provides aspects from the essential concepts overview and basic principles to detailed introduction, explanation of the current methods and their practical techniques. It also presents discussions on the research trends and latest results in conjunction with new development of technical methods. This is an excellent read for those who do not have a subject background in image technology but need to use these techniques to complete specific tasks. These essential information will also be useful for their further study in the relevant fields.
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster, more stable AI algorithms and approaches, knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water management An IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillance An IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal, social, and industrial applications. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
|