![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer software packages > General
This new edition has been completely updated to accommodate the needs of users of SPSS Release 12 and 13 for Windows, whilst still being applicable to those using SPSS Release 11 and 10. Alan Bryman and Duncan Cramer provide a non-technical approach to quantitative data analysis and a user-friendly introduction to the widely used SPSS. No previous familiarity with computing or statistics is required to benefit from this step-by-step guide to techniques including: Non-parametric tests Correlation Simple and multiple regression Multivarate analysis of variance and covariance Factor analysis The authors discuss key issues facing the newcomer to research, such as how to decide which statistical procedure is suitable, and how to interpret the subsequent results. Each chapter contains worked examples to illustrate the points raised and ends with a comprehensive range of exercises which allow the reader to test their understanding of the topic. This new edition of this hugely successful textbook will guide the reader through the basics of quantitative data analysis and become an essential reference tool for both students and researchers in the social sciences. The datasets used in Quantitative Data Analysis for SPSS Release 12 and 13 are available online at www.psypress.com/brymancramer/ .
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016. The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.
This book provides precise descriptions and instructions which enable users, students and consultants to understand Microsoft Dynamics AX rapidly. Microsoft offers Dynamics AX as its premium ERP solution, supporting large and mid-sized organizations with a complete business management solution which is easy to use. Going through a simple but comprehensive case study, this book provides the required knowledge to handle all basic business processes in Dynamics AX. Exercises are there to train the processes and functionality, also making this book a good choice for self-study.
This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.
This 2-volume set constitutes the refereed proceedings of the 4th International Conference on HCI in Business, Government and Organizations, HCIBGO 2017, held as part of the 19 International Conference on Human-Computer Interaction , HCII 2017, which took place in Vancouver, Canada, in July 2017. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 35 papers presented in this volume, focusing on supporting business, are organized in topical sections named: e-commerce and consumer behavior; social media for business; analytics, visualization and decision support.
Schon immer hat Technologiewandel zu Veranderungen in der Facharbeit und damit auch in der dualen Berufsausbildung gefuhrt. In dem vorliegenden Band wird der Wandel des UEberganges von der Festnetz-Telefonie zur Internet Protocol-Telefonie empirisch untersucht. Die evidenzbasierten Ergebnisse werden zu konkreten Vorschlagen zur Implementierung in die Lernfeldstruktur, zu Handlungsempfehlungen fur schulinterne Curricula sowie zu Vorschlagen zur Implementierung in den Unterricht weiterentwickelt und dargestellt.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.
This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016. The 12 revised full papers presented in this volume were carefully reviewed and selected from 32 submissions. The papers are organized in three sessions: eIDAS and data protection regulation; IoT and public clouds; and privacy policies and privacy risk presentation.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
This volume constitutes the refereed proceedings of the Third International Conference on HCI in Business, Government and Organizations, HCIBGO 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, which took place in Toronto, Canada, in July 2016. HCII 2016 received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. The 53 papers presented in this volume are organized in topical sections named: social media for business; electronic, mobile and ubiquitous commerce; business analytics and visualization; branding, marketing and consumer behavior; and digital innovation.
The papers presented in this volume advance the state-of-the-art research on digital marketing and social media, mobile computing and responsive web design, semantic technologies and recommender systems, augmented and virtual reality, electronic distribution and online travel reviews, MOOC and eLearning, eGovernment and sharing economy. This book covers the most significant areas contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in eTourism.
This book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy.
This book constitutes the refereed conference proceedings of the 15th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2016, held in Swansea, UK, in September 2016 The 47 full and 17 short papers presented were carefully reviewed and selected from 90 submissions. They are organized in the following topical sections: social media strategy and digital business; digital marketing and customer relationship management; adoption and diffusion; information sharing on social media; impression, trust, and risk management; data acquisition, management and analytics; e-government and civic engagement; e-society and online communities.
This book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurity
This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015. The 49 full papers presented were carefully reviewed and selected from 125 submissions. The papers deal with the following topics: multidisciplinary research on social networks; ethical issues related to SNS; information technology and social networks mining.
Chapter "Developing a VR Tool to Support Repeat Pattern Design Learning " is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the refereed proceedings of the 12th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2015, held in Rome, Italy, in August 2015. The 17 full papers and 3 short papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections such as mobile services and applications; usability and visualization; mobile networks and applications; mobile data services; smart phones and mobile commerce applications.
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
This book constitutes revised selected papers from the 20th Workshop on e-Business, WeB 2021, which took place virtually on December 11, 2021.The purpose of WeB is to provide a forum for researchers and practitioners to discuss findings, novel ideas, and lessons learned to address major challenges and map out the future directions for e-Business. The WeB 2021 theme was "From Grand Challenges to Great Solutions: Digital Transformation in the Age of COVID-19." The 8 papers included in this volume were carefully reviewed and selected from a total of 24 submissions. The contributions are organized in topical sections as follows: digital innovation and transformation, and e-commerce and social media.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.
SPSS Statistics Workbook For Dummies gives you the practice you need to navigate the leading statistical software suite. Data management and analysis, advanced analytics, business intelligence―SPSS is a powerhouse of a research platform, and this book helps you master the fundamentals and analyze data more effectively. You’ll work through practice problems that help you understand the calculations you need to perform, complete predictive analyses, and produce informative graphs. This workbook gives you hands-on exercises to hone your statistical analysis skills with SPSS Statistics 28. Plus, explanations and insider tips help you navigate the software with ease. Practical and easy-to-understand, in classic Dummies style.
Software is pervasive in our lives. We are accustomed to dealing with the failures of much of that software - restarting an application is a very familiar solution. Such solutions are unacceptable when the software controls our cars, airplanes and medical devices or manages our private information. These applications must run without error. SPARK provides a means, based on mathematical proof, to guarantee that a program has no errors. SPARK is a formally defined programming language and a set of verification tools specifically designed to support the development of software used in high integrity applications. Using SPARK, developers can formally verify properties of their code such as information flow, freedom from runtime errors, functional correctness, security properties and safety properties. Written by two SPARK experts, this is the first introduction to the just-released 2014 version. It will help students and developers alike master the basic concepts for building systems with SPARK.
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.
This book constitutes the refereed proceedings of the five workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2014, which took place in Larnaca, Cyprus, in May 2014. The 27 papers in this volume were carefully reviewed and selected from 53 submissions and were revised and extended after the event. The workshop topics covered applications and economics of knowledge-based technologies (AKTB), business and IT alignment (BITA), digital currencies (DC), modern applications of business information systems (MODAPP), and tools for setting up and running a business in cloud computing (TSRB). In addition a keynote paper is included in this book. |
![]() ![]() You may like...
Confident Data Science - Discover the…
Adam Ross Nelson
Hardcover
Synchrotron Radiation - Basics, Methods…
Settimio Mobilio, Federico Boscherini, …
Hardcover
R7,604
Discovery Miles 76 040
Advances in SIoT (Social Internet of…
Gururaj H L, Pramod H B, …
Hardcover
R3,509
Discovery Miles 35 090
|