0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (14)
  • R100 - R250 (579)
  • R250 - R500 (2,111)
  • R500+ (28,381)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > General

Advanced Computational Techniques for Sustainable Computing (Hardcover): Megha Rathi, Adwitiya Sinha Advanced Computational Techniques for Sustainable Computing (Hardcover)
Megha Rathi, Adwitiya Sinha
R4,433 Discovery Miles 44 330 Ships in 9 - 15 working days

Provides insight on building smart sustainable solutions Includes details of applying mining, learning, IOT and sensor-based techniques for sustainable computing Entails data extraction from various sources followed with pre-processing of data, and how to make effective use of extracted data for application-based research Involves practical usage of data analytic language, including R, Python, etc. for improving sustainable services offered by multi-disciplinary domains Encompasses comparison and analysis of recent technologies and trends Includes development of smart models for information gain and effective decision making with visualization

Cyberpredators and Their Prey (Paperback): Lauren R Shapiro Cyberpredators and Their Prey (Paperback)
Lauren R Shapiro
R1,495 Discovery Miles 14 950 Ships in 9 - 15 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R2,958 Discovery Miles 29 580 Ships in 9 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Ransomware and Cybercrime (Paperback): Andrew Jenkinson Ransomware and Cybercrime (Paperback)
Andrew Jenkinson
R946 Discovery Miles 9 460 Ships in 9 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,792 Discovery Miles 17 920 Ships in 12 - 17 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Generative Adversarial Networks and Deep Learning - Theory and Applications (Hardcover): Roshani Raut, Pranav D Pathak, Sachin... Generative Adversarial Networks and Deep Learning - Theory and Applications (Hardcover)
Roshani Raut, Pranav D Pathak, Sachin R Sakhare, Sonali Patil
R4,126 Discovery Miles 41 260 Ships in 9 - 15 working days

This book explores how to use generative adversarial networks in a variety of applications and emphasises their substantial advancements over traditional generative models. This book's major goal is to concentrate on cutting-edge research in deep learning and generative adversarial networks, which includes creating new tools and methods for processing text, images, and audio. A Generative Adversarial Network (GAN) is a class of machine learning framework and is the next emerging network in deep learning applications. Generative Adversarial Networks(GANs) have the feasibility to build improved models, as they can generate the sample data as per application requirements. There are various applications of GAN in science and technology, including computer vision, security, multimedia and advertisements, image generation, image translation,text-to-images synthesis, video synthesis, generating high-resolution images, drug discovery, etc. Features: Presents a comprehensive guide on how to use GAN for images and videos. Includes case studies of Underwater Image Enhancement Using Generative Adversarial Network, Intrusion detection using GAN Highlights the inclusion of gaming effects using deep learning methods Examines the significant technological advancements in GAN and its real-world application. Discusses as GAN challenges and optimal solutions The book addresses scientific aspects for a wider audience such as junior and senior engineering, undergraduate and postgraduate students, researchers, and anyone interested in the trends development and opportunities in GAN and Deep Learning. The material in the book can serve as a reference in libraries, accreditation agencies, government agencies, and especially the academic institution of higher education intending to launch or reform their engineering curriculum

Digital Project Practice for New Work and Industry 4.0 (Paperback): Tobias Endress Digital Project Practice for New Work and Industry 4.0 (Paperback)
Tobias Endress
R1,322 Discovery Miles 13 220 Ships in 9 - 15 working days

New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.

Cybertax - Managing the Risks and Results (Paperback): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Paperback)
George K. Tsantes, James Ransome
R492 Discovery Miles 4 920 Ships in 9 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Continuous and Embedded Learning for Organizations (Paperback): Jon M. Quigley, Shawn P. Quigley Continuous and Embedded Learning for Organizations (Paperback)
Jon M. Quigley, Shawn P. Quigley
R1,338 Discovery Miles 13 380 Ships in 9 - 15 working days

There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.

PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,090 Discovery Miles 10 900 Ships in 9 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R1,096 Discovery Miles 10 960 Ships in 9 - 15 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

Natural Language Processing in the Real-World (Hardcover): Jyotika Singh Natural Language Processing in the Real-World (Hardcover)
Jyotika Singh
R1,832 Discovery Miles 18 320 Ships in 9 - 15 working days

'Natural Language Processing in the Real World' is a practical guide for applying data science and machine learning to build Natural Language Processing (NLP) solutions. Where traditional, academic-taught NLP is often accompanied by a data source or dataset to aid solution building, this book is situated in the real-world where there may not be an existing rich dataset. This book covers the basic concepts behind NLP and text processing and discusses the applications across 15 industry verticals. From data sources and extraction to transformation and modelling, and classic Machine Learning to Deep Learning and Transformers, several popular applications of NLP are discussed and implemented. This book provides a hands-on and holistic guide for anyone looking to build NLP solutions, from students of Computer Science to those involved in large-scale industrial projects. .

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,257 Discovery Miles 22 570 Ships in 9 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Software Security - Concepts & Practices (Hardcover): Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan Software Security - Concepts & Practices (Hardcover)
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
R3,570 Discovery Miles 35 700 Ships in 9 - 15 working days

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Blockchain - A Hype or a Hoax? (Paperback): Kapil Sharma Blockchain - A Hype or a Hoax? (Paperback)
Kapil Sharma
R1,100 Discovery Miles 11 000 Ships in 9 - 15 working days

Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.

Digital Image Processing With C++ - Implementing Reference Algorithms With the CImg Library (Hardcover): David Tschumperle,... Digital Image Processing With C++ - Implementing Reference Algorithms With the CImg Library (Hardcover)
David Tschumperle, Christophe Tilmant, Vincent Barra
R2,983 Discovery Miles 29 830 Ships in 9 - 15 working days

Digital Image Processing with C++ presents the theory of digital image processing, and implementations of algorithms using a dedicated library. Processing a digital image means transforming its content (denoising, stylizing, etc.), or extracting information to solve a given problem (object recognition, measurement, motion estimation, etc.). This book presents the mathematical theories underlying digital image processing, as well as their practical implementation through examples of algorithms implemented in the C++ language, using the free and easy-to-use CImg library. Chapters cover in a broad way the field of digital image processing and proposes practical and functional implementations of each method theoretically described. The main topics covered include filtering in spatial and frequency domains, mathematical morphology, feature extraction and applications to segmentation, motion estimation, multispectral image processing and 3D visualization. Students or developers wishing to discover or specialize in this discipline, teachers and researchers wishing to quickly prototype new algorithms, or develop courses, will all find in this book material to discover image processing or deepen their knowledge in this field.

Cloud-based Multi-Modal Information Analytics - A Hands-on Approach (Hardcover): Srinidhi Hiriyannaiah, Siddesh G.M., Srinivasa... Cloud-based Multi-Modal Information Analytics - A Hands-on Approach (Hardcover)
Srinidhi Hiriyannaiah, Siddesh G.M., Srinivasa K. G
R2,678 Discovery Miles 26 780 Ships in 9 - 15 working days

Cloud based Multi-Modal Information Analytics: A Hands-on Approach discusses the various modalities of data and provide an aggregated solutions using cloud. It includes the fundamentals of neural networks, different types and how it can be used for the multi-modal information analytics. The various application areas that are image-centric and video are also presented with deployment solutions in the cloud. Features Life cycle of the multi- modal data analytics is discussed with applications of modalities of text, image, and video. Deep Learning fundamentals and architectures covering CNN, RNN and its types for learning for different multi-modal networks. Applications of Multi-Modal Analytics covering Text , Speech, and Image. This book is aimed at researchers in Multi-modal analytics and related areas

Bankers Like Us - Dispatches from an Industry in Transition (Hardcover): Leda Glyptis Bankers Like Us - Dispatches from an Industry in Transition (Hardcover)
Leda Glyptis
R977 Discovery Miles 9 770 Ships in 9 - 15 working days

This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. -Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank The world is going digital, and so is banking-in fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand the industry and its quirks. Bankers who have the grit, determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a 'this is who we are' piece, including the author's trench credentials. It then present an overview of corporate culture (this is what we deal with and a few ideas on how to handle it), as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds, and a hopeful look-ahead on what a team of principled, dedicated folks can do despite everything.

ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition): John Dean, Ray Dean ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition)
John Dean, Ray Dean
R1,799 Discovery Miles 17 990 Ships in 12 - 17 working days

Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem solving. For example, Chapter 2 is devoted to algorithm development, Chapter 8 is devoted to program design, and problem-solving sections appear throughout the book. The third edition introduces several new Java language features, most of the end-of-chapter GUI sections and the final GUI chapters use JavaFX, and almost all end-of-chapter exercises are new.

Digital Image Processing With C++ - Implementing Reference Algorithms With the CImg Library (Paperback): David Tschumperle,... Digital Image Processing With C++ - Implementing Reference Algorithms With the CImg Library (Paperback)
David Tschumperle, Christophe Tilmant, Vincent Barra
R1,258 Discovery Miles 12 580 Ships in 9 - 15 working days

Digital Image Processing with C++ presents the theory of digital image processing, and implementations of algorithms using a dedicated library. Processing a digital image means transforming its content (denoising, stylizing, etc.), or extracting information to solve a given problem (object recognition, measurement, motion estimation, etc.). This book presents the mathematical theories underlying digital image processing, as well as their practical implementation through examples of algorithms implemented in the C++ language, using the free and easy-to-use CImg library. Chapters cover in a broad way the field of digital image processing and proposes practical and functional implementations of each method theoretically described. The main topics covered include filtering in spatial and frequency domains, mathematical morphology, feature extraction and applications to segmentation, motion estimation, multispectral image processing and 3D visualization. Students or developers wishing to discover or specialize in this discipline, teachers and researchers wishing to quickly prototype new algorithms, or develop courses, will all find in this book material to discover image processing or deepen their knowledge in this field.

Deep Learning for Crack-Like Object Detection (Hardcover): Kaige Zhang, Heng-Da Cheng Deep Learning for Crack-Like Object Detection (Hardcover)
Kaige Zhang, Heng-Da Cheng
R1,398 Discovery Miles 13 980 Ships in 9 - 15 working days

Computer vision-based crack-like object detection has many useful applications, such as pavement surface inspection, underground pipeline inspection, bridge cracking monitoring, railway track assessment, etc. However, in most contexts, cracks appear as thin, irregular long-narrow objects, and often are buried into complex, textured background with high diversity which make the crack detection very challenging. During the past a few years, the deep learning technique has achieved great success and has been utilized for solving a variety of object detection problems. However, using deep learning for accurate crack localization is non-trivial. This book discusses crack-like object detection problem in a comprehensive way. It starts by discussing traditional image processing approaches for solving this problem, and then introduces deep learning-based methods. The book provides a comprehensive review of object detection problems and focuses on the most challenging problem, crack-like object detection, to dig deep into the deep learning method. It includes examples of real-world problems, which are easy to understand and could be a good tutorial for introducing computer vision and machine learning.

Philosophy through Computer Science - An Introduction (Paperback): Daniel Lim Philosophy through Computer Science - An Introduction (Paperback)
Daniel Lim
R1,069 Discovery Miles 10 690 Ships in 9 - 15 working days

What do philosophy and computer science have in common? It turns out, quite a lot! In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches the reader fundamental programming skills and also allows her to develop the critical thinking skills essential for examining some of the enduring questions of philosophy. Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation), allowing the reader to develop the ability to write larger computer programs that require decomposition, abstraction, and algorithmic thinking Uses computational concepts to introduce, clarify, and develop a variety of philosophical issues Covers various aspects of machine learning and relates them to philosophical issues involving science and induction as well as to ethical issues Provides a framework to critically analyze arguments in classic and contemporary philosophical debates

Big Data (Paperback): Benoit Leclerc, Jesse Cale Big Data (Paperback)
Benoit Leclerc, Jesse Cale
R1,231 Discovery Miles 12 310 Ships in 9 - 15 working days

The internet has launched the world into an era into which enormous amounts of data are generated every day through technologies with both positive and negative consequences. This often refers to big data . This book explores big data in organisations operating in the criminology and criminal justice fields. Big data entails a major disruption in the ways we think about and do things, which certainly applies to most organisations including those operating in the criminology and criminal justice fields. Big data is currently disrupting processes in most organisations - how different organisations collaborate with one another, how organisations develop products or services, how organisations can identify, recruit, and evaluate talent, how organisations can make better decisions based on empirical evidence rather than intuition, and how organisations can quickly implement any transformation plan, to name a few. All these processes are important to tap into, but two underlying processes are critical to establish a foundation that will permit organisations to flourish and thrive in the era of big data - creating a culture more receptive to big data and implementing a systematic data analytics-driven process within the organisation. Written in a clear and direct style, this book will appeal to students and scholars in criminology, criminal justice, sociology, and cultural studies but also to government agencies, corporate and non-corporate organisations, or virtually any other institution impacted by big data.

CMOS Analog Integrated Circuits - High-Speed and Power-Efficient Design, Second Edition (Hardcover): Tertulien Ndjountche CMOS Analog Integrated Circuits - High-Speed and Power-Efficient Design, Second Edition (Hardcover)
Tertulien Ndjountche
R5,374 Discovery Miles 53 740 Ships in 12 - 17 working days

High-speed, power-efficient analog integrated circuits can be used as standalone devices or to interface modern digital signal processors and micro-controllers in various applications, including multimedia, communication, instrumentation, and control systems. New architectures and low device geometry of complementary metaloxidesemiconductor (CMOS) technologies have accelerated the movement toward system on a chip design, which merges analog circuits with digital, and radio-frequency components.

Multilevel Security for Relational Databases (Paperback): Osama S Faragallah, El-Sayed M.  El-Rabaie, Fathi E. Abd El-Samie,... Multilevel Security for Relational Databases (Paperback)
Osama S Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I Sallam, Hala S El-Sayed
R1,775 Discovery Miles 17 750 Ships in 12 - 17 working days

Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Interaction Design: Beyond…
Rogers Paperback R1,882 Discovery Miles 18 820
ITIL(R) 4 Essentials - Your essential…
Claire Agutter Paperback R1,037 Discovery Miles 10 370
English Insights 2
Jane Bailey, Paul Dummett, … Paperback R824 Discovery Miles 8 240
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, … Paperback  (3)
R1,311 R1,177 Discovery Miles 11 770
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R459 R342 Discovery Miles 3 420
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,183 R1,068 Discovery Miles 10 680
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,892 Discovery Miles 28 920
Introduction to Computer Theory
Daniel I. A. Cohen Paperback  (4)
R6,764 Discovery Miles 67 640
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,176 R894 Discovery Miles 8 940
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,255 R1,126 Discovery Miles 11 260

 

Partners