![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > General
CSS Programming Professional Made Easy 2nd Edition: Expert CSS Programming Language Success in a Day for any Computer User! Do you know why CSS programming will save you time over any other programming language? Do you know why CSS programming loads pages faster? Do you know why using CSS has multiple device compatibilities? Need to learn CSS Selectors & association styles? What are the CSS Measurement Units? Need everything on colours, fonts, and background programming with CSS? Get right into it with all the answers provided with just one click!
We live in an increasingly interconnected and highly sophisticated society, where the Internet has led to tremendous improvements in the efficiency and effectiveness of public services. The Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements illustrates how technology in e-government saves individuals significant amounts of time and money, while adding value to citizens' experiences with government, thus better serving their needs. This handbook provides comprehensive coverage of the issues facing managers, consultants, and practitioners in e-government and assists them in formulating ICT strategies for use within their field. These new strategies will enable them to implement collaborative policy initiatives within the private, public, and non-profit sectors to ultimately eliminate the global digital divide.
Artificial Higher Order Neural Networks (HONNs) significantly change the research methodology that is used in economics and business areas for nonlinear data simulation and prediction. With the important advances in HONNs, it becomes imperative to remain knowledgeable about its benefits and improvements. Artificial Higher Order Neural Networks for Economics and Business is the first book to provide practical education and applications for the millions of professionals working in economics, accounting, finance and other business areas on HONNs and the ease of their usage to obtain more accurate application results. This source provides significant, informative advancements in the subject and introduces the concepts of HONN group models and adaptive HONNs.
Although the field of informal learning has much to contribute to the field of formal learning, these fields appear to be failing to synergize and balance to create the ideal education environment. Multiple Literacy and Science Education: ICTs in Formal and Informal Learning Environments explores the nature of various learning enlightenment mediums and their consequences within a classroom context to synchronize understanding within the schooling fields. This authoritative collection provides an overview of current research, practices, and evidence-based approaches regarding further development for best practices of multiple literacy teaching atmospheres.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.
Cellular Automata (CA) are a class of spatially and temporally discrete mathematical systems characterized by local interaction and synchronous dynamical evolution, which show complex behavior and are able to model biological phenomena. Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena describes the use of cellular automata to provide important insights into a vast range of physical, biological, social, economic and psychological phenomena. This book presents contemporary research on discrete dynamical systems such as one-dimensional and two-dimensional cellular automata and outlines how these systems can be exploited for artistic purposes, translating their mathematical configurations into music and visual media.
The book 'International English Olympiad' has been divided into five sections namely Word Structure and Knowledge, Reading Comprehension, Spoken and Written Expressions, Achievers section, and Model Papers. In every chapter, the theory has been explained through solved examples in lucid language. Multiple Choice Questions (MCQs) with Answer Key and Solutions are provided in the end of each chapter. Two Model Papers have been provided for practice purpose. A CD containing Study Chart for systematic preparation, Tips & Tricks to crack English Olympiad, Pattern of exam, and links of Previous Years Papers is accompanied with this book. #v&spublishers
C# Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Sample codes,are provided for a more visual approach on your learning You will also learn the designs and forms of C#, and what's more convenient than getting to know both sides! Want to know More? Buy Now
Advances in machine learning techniques and ever-increasing computing power has helped create a new generation of hardware and software technologies with practical applications for nearly every industry. As the progress has, in turn, excited the interest of venture investors, technology firms, and a growing number of clients, implementing intelligent automation in both physical and information systems has become a must in business. Handbook of Research on Smart Technology Models for Business and Industry is an essential reference source that discusses relevant abstract frameworks and the latest experimental research findings in theory, mathematical models, software applications, and prototypes in the area of smart technologies. Featuring research on topics such as digital security, renewable energy, and intelligence management, this book is ideally designed for machine learning specialists, industrial experts, data scientists, researchers, academicians, students, and business professionals seeking coverage on current smart technology models.
Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities is a pivotal reference source for the most up-to-date research on edge clustering models and weighted social networks. Presenting widespread coverage across a range of applicable perspectives and topics, such as neighborhood attacks, fast k-degree anonymization (FKDA), and vertex-clustering algorithms, this book is ideally designed for academics, researchers, post-graduates, and practitioners seeking current research on undirected networks and greedy algorithms for social network anonymization.
Consisting of an integrated technology platform, enterprise information systems enable organizations to integrate and coordinate all business processes, offering a strategic area of focus. ""Enterprise Information Systems for Business Integration in SMEs: Technological, Organizational, and Social Dimensions"" discusses the main issues, challenges, opportunities, and trends related to the impact of IT on every part of organizational and inter-organizational environments. Containing expert international contributions by leading field researchers, this publication provides readers with the most relevant findings in the topic of enterprise information systems.
As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amounts of data, and flexibility in operation, RFID aims to revamp the new millennium. Advanced RFID Systems, Security, and Applications features a comprehensive collection of research provided by leading experts in both academia and industries. This leading reference source provides state-of-the- art development on RFID and its contents will be of the upmost use to students and researchers at all levels as well as technologists, planners, and policy makers. RFID technology is progressing into a new phase of development.
An Address Book Designed for Social Media Lovers, Bloggers, YouTubers, Entrepreneurs, Business Professionals and anyone who uses the Internet every day. Created by YouTuber and Blogger, Sherry Adepitan. Record Internet Usernames and Passwords, Website Addresses and Additional Information. Never forget another Password.
Education and research in the field of information technology management can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Information Technology Management: Contemporary Issues supplements course instruction and student research with quality chapters focused on key issues concerning the management and utilization of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as information systems, knowledge management, and IT governance depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
ASP.NET Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of ASP.NET, and what's more convenient than getting to know both sides! Want to know More? Buy Now!
This is volume 73 of "Advances in Computers." This series, which
began publication in 1960, is the oldest continuously published
anthology that chronicles the ever- changing information technology
field. In these volumes we publish from 5 to 7 chapters, three
times per year, that cover the latest changes to the design,
development, use and implications of computer technology on society
today. In this current volume, subtitled "Emerging Technologies,"
we discuss several new advances in computer software generation as
well as describe new applications of those computers.
Language learning is one of the most rapidly changing disciplines. Along with changing perspectives in learning in the field of Second Language Acquisition, information communication technology (ICT) has also created many learning paths to assist the process of learning a second language (L2). In such an ever-evolving environment, teachers, researchers, and professionals of a diverse number of disciplines need access to the most current information about research on the field of computer-enhanced language acquisition and learning.""Handbook of Research on Computer-Enhanced Language Acquisition and Learning"" provides comprehensive coverage of successful translation of language learning designs utilizing ICT in practical learning contexts. This authoritative reference source amasses research from over XX authors from XX countries, offering researchers, scholars, students, and professionals worldwide, access to the latest knowledge related to research on computer-enhanced language acquisition and learning.
For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.
This is an overview of the end-to-end data cleaning process. Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, this book describes various error detection and repair methods, and attempts to anchor these proposals with multiple taxonomies and views. Specifically, it covers four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, it includes a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.
A decade after Anonymous first appeared, it has grown from a small band of hacktivists to a Global Collective with organized National Cells in half the countries on Earth and 2.5 million dedicated participants worldwide. Behind The Mask explores four critical years in the formation of Anonymous as it solidified into the most powerful movement in human history. Join Commander X and other Anons from those early days as they take you on a grand adventure, and give everyone a small glimpse Behind The Mask. www.BehindTheMask.cf |
You may like...
Perspectives on Web Services - Applying…
Olaf Zimmermann, Mark Tomlinson, …
Hardcover
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|