![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > General
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
It is widely acknowledged that a common knowledge base for European research is necessary. Research repositories are an important innovation to the scientific information infrastructure. In 2006, digital repositories in the 27 countries of the European were surveyed, covering 114 repositories from 17 European countries. In follow-up, this book presents the results of the 2008 survey. It shows an increasing number of respondents, but also a further diversification in the character of a repository. Repositories may be institutional or thematically based, and as such non-institutional as well. 178 Institutional research repositories and 14 thematic and other noninstitutional repositories from 22 European countries took part actively. European practices should be harmonized and the development of state-of-the-art technology facilitated. Authors, institutes and information users are stakeholders in this process. In presenting a state-of the art of developments, this book is a valuable guide for them in developing their policy on research repositories without losing contact with others. The ongoing process of widespread and diversification of digital repositories puts urgency on coherent approach, as a basic feature of repositories is the retrievability of information that may be dispersed over many of them. Continued monitoring of developments will be necessary.
As business paradigm shifts from a desktop-centric environment to a data-centric mobile environment, mobile services provide numerous new business opportunities, and in some cases, challenge some of the basic premises of existing business models.Strategy, Adoption, and Competitive Advantage of Mobile Services in the Global Economy seeks to foster a scientific understanding of mobile services, provide a timely publication of current research efforts, and forecast future trends in the mobile services industry. This book is an ideal resource for academics, researchers, government policymakers, as well as corporate managers looking to enhance their competitive edge in or understanding of mobile services.
This book provides a broad-based approach to decision support systems (DSS) and their applications to finance and accounting. Heymann and Bloom go beyond mere description of DSS applications for particular system configurations to provide a comprehensive, technical analysis. They identify the changing roles over time of finance and accounting within organizational management and business control systems, outline the foundation of economic models within the objectives and methodology of scientific research, and provide an introduction to the logical structure of theoretical models in finance and accounting. The systems approach is examined as an alternative to the traditional decision model approach, and different tasks within a firm are presented in terms of complex and integrated management processes. In addition, the authors describe the role of DSS in the management of a firm, present specific applications of DSS in the areas of finance and accounting, and discuss the future outlook of DSS in computerized management systems as well as their possible effects on organizational structures and management control procedures.
Studying narratives is often the best way to gain a good understanding of how various aspects of human information are organized and integrated-the narrator employs specific informational methods to build the whole structure of a narrative through combining temporally constructed events in light of an array of relationships to the narratee and these methods reveal the interaction of the rational and the sensitive aspects of human information. Computational and Cognitive Approaches to Narratology discusses issues of narrative-related information and communication technologies, cognitive mechanism and analyses, and theoretical perspectives on narratives and the story generation process. Focusing on emerging research as well as applications in a variety of fields including marketing, philosophy, psychology, art, and literature, this timely publication is an essential reference source for researchers, professionals, and graduate students in various information technology, cognitive studies, design, and creative fields.
With more restrictions upon animal experimentations, pharmaceutical industries are currently focusing on a new generation of experiments and technologies that are considerably more efficient and less controversial. The integration of computational and experimental strategies has led to the identification and development of promising compounds. Computer Applications in Drug Discovery and Development is a pivotal reference source that provides innovative research on the application of computers for discovering and designing new drugs in modern molecular biology and medicinal chemistry. While highlighting topics such as chemical structure databases and dataset utilization, this publication delves into the current panorama of drug discovery, where high drug failure rates are a major concern and properly designed virtual screening strategies can be a time-saving, cost-effective, and productive alternative. This book is ideally designed for chemical engineers, pharmacists, molecular biologists, students, researchers, and academicians seeking current research on the unexplored avenues and future perspectives of drug design.
The information technology explosion in our global society is creating tremendous challenges and opportunities for educators as we help shape the next generation of information pioneers. But in these times of severe budget cuts, our challenges become even greater, and the necessity for success more critical. Current Issues in IT Education addresses the ongoing quest for teaching excellence in the midst of implementing teaching technologies and crossing disciplinary boundaries.
The computer is the great technological and scientific innovation of the last half of the twentieth century. It has revolutionized how we organize information, how we communicate with each other, and even the way that we think about the human mind. Computers have eased the drudgery of such tasks as calculating sums and clerical work, making them both more bearable and more efficient. The computer has become ubiquitous in many aspects of business, recreation, and everyday life, and the trend is that they are becoming both more powerful and easier to use. Computers: The Life Story of a Technology provides an accessible overview of this ever changing technology history, giving students and lay readers an understanding of the complete scope of its history from ancient times to the present day. In addition to providing a concise biography of how this technology developed, this book provides insights into how the computer has changed our lives: * Demonstrates how, just as the invention of the steam engine in the 1700s stimulated scientists to think of the laws of nature in terms of machines, the success of the computer in the late 1900s prompted scientists to think of the basic laws of the universe as being similar to the operation of a computer. * Provides a worldwide examination of computing, and how such needs as security and defense during the Cold War drove the development of computing technology. * Shows how the computer has entered almost every aspect of daily life in the 21st century The volume includes a glossary of terms, a timeline of important events, and a selected bibliography of useful resources for further information.
The World Wide Web exploded into public consciousness in 1995, a year which saw the coming of age of the Internet. People are communicating, working, shopping, learning, and entertaining themselves, as well as satisfying carnal desires and even finding God through the simple act of connecting their computers to the wide universe of cyberspace. We are assured, at the same time, that this progress will have profound effects on work, culture, leisure--everything, including the ways in which we interact with each other. Yet just what these effects will be, how power will be distributed, and what recourse will be available to those adversely affected by the new technologies, are issues that have yet to be negotiated. Aside from the occasional panic over cyber-porn, few have considered the wide-ranging effects of our increasing reliance on interactive technologies. "Cyberfutures" offers a close examination of issues that will become increasingly important as computers, networks, and technologies occupy crucial roles in our everyday lives. Comprised of essays from a range of occupational and disciplinary perspectives, including those of Vivian Sobchack and Arturo Escobar, this volume makes essential reading for students in cultural and media studies, anthropology, as well as for citizens interested in considering the larger implications of the Information Superhighway.
Competitive intelligence uses public sources to obtain valuable information on competition and competitors. By using competitive intelligence aggressively and intelligently, corporations can obtain information on potential acquisition targets, markets, key personnel, the probable emergence of new products, or the financial strength or contracts of a competing firm. An absolutely indispensable playbook for anyone who has to compete during the information explosion. "Martin Sikora, Editor, Mergers and AcquisitionS" Competitive intelligence uses public sources to obtain valuable information on competition and competitors. In an open society such as our own, businesses place a great deal of information in the public domain. By using competitive intelligence aggressively and intelligently, corporations can obtain information on potential acquisition targets, markets, key personnel, the probable emergence of new products, or the financial strength or contracts of a competing firm. In fact, the authors contend that as much as 90 percent of the information required to decide on a course of litigation, acquisitions, expansion, new product introduction, or financing, is available through competitive intelligence.
This volume represents the papers reviewed and accepted for the HOIT2007 conference held at the Indian Institute of Technology Madras in the city of Chennai, India in August 2007. This volume addresses many of the major themes of current interest in the field, with a particular focus on community-based technologies. This comprehensive book is divided into five different sections reflecting the most up-to-date research on computers and society.
This book is located at the interface of online learning within a context of English language studies and academic literacy and is underpinned, from a critical theoretical perspective, by an understanding of the implications of the digital divide for developing countries worldwide. The work is an exploration of online learning in an undergraduate English language and academic literacy classroom at a university in South Africa, and theorises the need for technology in developing countries as a means of social inclusion. The aim is to explore the extent to which communities of practice are enabled in an online environment, among English non-mother tongue speakers from technologically under-resourced backgrounds. This study examines the extent to which the students participate, negotiate meaning, and construct identities in online spaces. From a sociocultural perspective this book locates learning as a form of interaction and co-participation, and argues that learning occurs within specific contexts, hence the focus on how individuals become members of 'communities of practice'.
The Internet is connecting enterprises into a global economy.
Companies are exposing their directories, or a part of their
directories, to customers, business partners, the Internet as a
whole, and to potential "hackers." If the directory structure is
compromised, then the whole enterprise can be at risk. Security of
this information is of utmost importance.
This is volume 73 of "Advances in Computers." This series, which
began publication in 1960, is the oldest continuously published
anthology that chronicles the ever- changing information technology
field. In these volumes we publish from 5 to 7 chapters, three
times per year, that cover the latest changes to the design,
development, use and implications of computer technology on society
today. In this current volume, subtitled "Emerging Technologies,"
we discuss several new advances in computer software generation as
well as describe new applications of those computers.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
At a time when Internet use is closely tracked and social networking sites supply data for targeted advertising, Lars Heide presents the first academic study of the invention that fueled today's information revolution: the punched card. Early punched cards helped to process the United States census in 1890. They soon proved useful in calculating invoices and issuing pay slips. As demand for more sophisticated systems and reading machines increased in both the United States and Europe, punched cards served ever-larger data-processing purposes. Insurance companies, public utilities, businesses, and governments all used them to keep detailed records of their customers, competitors, employees, citizens, and enemies. The United States used punched-card registers in the late 1930s to pay roughly 21 million Americans their Social Security pensions, Vichy France used similar technologies in an attempt to mobilize an army against the occupying German forces, and the Germans in 1941 developed several punched-card registers to make the war effort--and surveillance of minorities--more effective. Heide's analysis of these three major punched-card systems, as well as the impact of the invention on Great Britain, illustrates how different cultures collected personal and financial data and how they adapted to new technologies. This comparative study will interest students and scholars from a wide range of disciplines, including the history of technology, computer science, business history, and management and organizational studies. |
You may like...
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
|