Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer software packages > General
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.
This 2-volume set constitutes the refereed proceedings of the 4th International Conference on HCI in Business, Government and Organizations, HCIBGO 2017, held as part of the 19 International Conference on Human-Computer Interaction , HCII 2017, which took place in Vancouver, Canada, in July 2017. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 35 papers presented in this volume, focusing on supporting business, are organized in topical sections named: e-commerce and consumer behavior; social media for business; analytics, visualization and decision support.
This book constitutes the refereed proceedings of the 13th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2016, held in Athens. Greece, in September 2016. The 11 revised full papers and 11 short papers presented were carefully reviewed and selected from 38 submissions. This volume has been structured following the seven sessions that comprised the conference program (three of which are work-in-progress sessions): Session 1: Business Models Session 2: Work in Progress on Quality of Services and Service Level Agreements Session 3: Work in Progress on Cloud Economics Session 4: Energy Consumption Session 5: Resource Allocation Session 6: Work in Progress on Resource Allocation Session 7: Cloud Applications
Chapter "Developing a VR Tool to Support Repeat Pattern Design Learning " is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This 2-volume set constitutes the refereed proceedings of the 4th International Conference on HCI in Business, Government and Organizations, HCIBGO 2017, held as part of the 19 International Conference on Human-Computer Interaction , HCII 2017, which took place in Vancouver, Canada, in July 2017. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 31 papers presented in this volume, focusing on interacting with information systems, are organized in topical sections named: human-centered design in information systems; information systems in healthcare, learning, cultural heritage and government; novel interaction devices and techniques;
In Open Sources, leaders of Open Source come together in print for the first time to discuss the new vision of the software industry they have created, through essays that explain how the movement works, why it succeeds, and where it is going. A powerful vision from the movement's spiritual leaders, this book reveals the mysteries of how open development builds better software and how businesses can leverage freely available software for a competitive business advantage.
This new edition has been completely updated to accommodate the needs of users of SPSS Release 12 and 13 for Windows, whilst still being applicable to those using SPSS Release 11 and 10. Alan Bryman and Duncan Cramer provide a non-technical approach to quantitative data analysis and a user-friendly introduction to the widely used SPSS. No previous familiarity with computing or statistics is required to benefit from this step-by-step guide to techniques including: Non-parametric tests Correlation Simple and multiple regression Multivarate analysis of variance and covariance Factor analysis The authors discuss key issues facing the newcomer to research, such as how to decide which statistical procedure is suitable, and how to interpret the subsequent results. Each chapter contains worked examples to illustrate the points raised and ends with a comprehensive range of exercises which allow the reader to test their understanding of the topic. This new edition of this hugely successful textbook will guide the reader through the basics of quantitative data analysis and become an essential reference tool for both students and researchers in the social sciences. The datasets used in Quantitative Data Analysis for SPSS Release 12 and 13 are available online at www.psypress.com/brymancramer/ .
Many Linux and Unix developers are familiar with the GNU debugger (GBD), the invaluable open source tool for testing, fixing, and retesting software. And since GDB can be ported to Windows, Microsoft developers and others who use this platform can also take advantage of this amazing free software that allows you to see exactly what's going on inside of a program as it's executing. This new pocket guide gives you a convenient quick reference for using the debugger with several different programming languages, including C, C++, Java, Fortran and Assembly. The GNU debugger is the most useful tool during the testing phase of the software development cycle because it helps you catch bugs in the act. You can see what a program was doing at the moment it crashed, and then readily pinpoint and correct problem code. With the "GDB Pocket Reference" on hand, the process is quick and painless. The book covers the essentials of using GBD is a testing environment, including how to specify a target for debugging and how to make a program stop on specified conditions. This handy guide also provides details on using the debugger to examine the stack, source files and data to find the cause of program failure-and then explains ways to use GBD to make quick changes to the program for further testing and debugging. The ability to spot a bug in real time with GDB can save you hours of frustration, and having a quick way to refer to GBD's essential functions is key to making the process work. Once you get your hands on the "GDB Pocket Reference," you'll never let go!
This book constitutes revised selected papers from the 20th Workshop on e-Business, WeB 2021, which took place virtually on December 11, 2021.The purpose of WeB is to provide a forum for researchers and practitioners to discuss findings, novel ideas, and lessons learned to address major challenges and map out the future directions for e-Business. The WeB 2021 theme was "From Grand Challenges to Great Solutions: Digital Transformation in the Age of COVID-19." The 8 papers included in this volume were carefully reviewed and selected from a total of 24 submissions. The contributions are organized in topical sections as follows: digital innovation and transformation, and e-commerce and social media.
Achieve best-in-class metrics and get more from your data with JMP JMP Connections is the small- and medium-sized business owner's guide to exceeding customer expectations by getting more out of your data using JMP. Uniquely bifunctional, this book is divided into two parts: the first half of the book shows you what JMP can do for you. You'll discover how to wring every last drop of insight out of your data, and let JMP parse reams of raw numbers into actionable insight that leads to better strategic decisions. You'll also discover why it works so well; clear explanations break down the Connectivity platform and metrics in business terms to demystify data analysis and JMP while giving you a macro view of the benefits that come from optimal implementation. The second half of the book is for your technical team, demonstrating how to implement specific solutions relating to data set development and data virtualization. In the end, your organization reduces Full Time Equivalents while increasing productivity and competitiveness. JMP is a powerful tool for business, but many organizations aren't even scratching the surface of what their data can do for them. This book provides the information and technical guidance your business needs to achieve more. Learn what a JMP Connectivity Platform can do for your business Understand Metrics-on-Demand, Real-Time Metrics, and their implementation Delve into technical implementation with information on configuration and management, version control, data visualization, and more Make better business decisions by getting more and better information from your data Business leadership relies on good information to make good business decisions--but what if you could increase the quality of the information you receive, while getting more of what you want to know and less of what you don't need to know? How would that affect strategy, operations, customer experience, and other critical areas? JMP can help with that, and JMP Connections provides real, actionable guidance on getting more out of JMP.
This book provides precise descriptions and instructions which enable users, students and consultants to understand Microsoft Dynamics AX rapidly. Microsoft offers Dynamics AX as its premium ERP solution, supporting large and mid-sized organizations with a complete business management solution which is easy to use. Going through a simple but comprehensive case study, this book provides the required knowledge to handle all basic business processes in Dynamics AX. Exercises are there to train the processes and functionality, also making this book a good choice for self-study.
This book constitutes the refereed conference proceedings of the 4th Annual Privacy Forum, APF 2016, held in Frankfurt/Main, Germany, in September 2016. The 12 revised full papers presented in this volume were carefully reviewed and selected from 32 submissions. The papers are organized in three sessions: eIDAS and data protection regulation; IoT and public clouds; and privacy policies and privacy risk presentation.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
This book constitutes the refereed conference proceedings of the 15th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2016, held in Swansea, UK, in September 2016 The 47 full and 17 short papers presented were carefully reviewed and selected from 90 submissions. They are organized in the following topical sections: social media strategy and digital business; digital marketing and customer relationship management; adoption and diffusion; information sharing on social media; impression, trust, and risk management; data acquisition, management and analytics; e-government and civic engagement; e-society and online communities.
This volume constitutes the refereed proceedings of the Third International Conference on HCI in Business, Government and Organizations, HCIBGO 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, which took place in Toronto, Canada, in July 2016. HCII 2016 received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. The 53 papers presented in this volume are organized in topical sections named: social media for business; electronic, mobile and ubiquitous commerce; business analytics and visualization; branding, marketing and consumer behavior; and digital innovation.
This book is broadly organized in three parts. The first section ('Enhancing and Managing Customer Value') focuses on presenting the state-of-knowledge in managing and enhancing customer value through extraction of consumer-centric knowledge from mountains of data that modern interactive applications generate. The extracted information can then be used to provide more personalized information to customers, provide more relevant information or products, and even to create innovative business processes to enhance overall value to customers. The second section in the book ('Computational Approaches for Business Processes') focuses on presenting several specific innovative computing artifacts and tools developed by researchers that are not yet commercially used. These represent cutting-edge thought and advances in business computing research that should soon find utility in real-world applications or as a tool to analyze real-world scenarios. The final section in the book ('Supporting Knowledge Enterprise') presents approaches and frameworks that focus on ability of an enterprise to analyze, build, and protect computing infrastructure that supports value-added dimensions to the enterprise's existing business processes.
The papers presented in this volume advance the state-of-the-art research on digital marketing and social media, mobile computing and responsive web design, semantic technologies and recommender systems, augmented and virtual reality, electronic distribution and online travel reviews, MOOC and eLearning, eGovernment and sharing economy. This book covers the most significant areas contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in eTourism.
This book constitutes the thoroughly refereed post-conference proceedings of the Third Annual Privacy Forum, APF 2015, held in Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume were carefully reviewed and selected from 24 submissions. The topics focus on privacy by design (PbD), i.e. the attempt to combine technical and organizational measures to ensure the basic rights of the individual. The papers are organized in three sessions: measuring privacy; rules and principles; legal and economic perspectives on privacy.
This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015. The 49 full papers presented were carefully reviewed and selected from 125 submissions. The papers deal with the following topics: multidisciplinary research on social networks; ethical issues related to SNS; information technology and social networks mining. |
You may like...
Developing Curriculum for Emergency…
Susana Silva, Paula Peres, …
Hardcover
R6,006
Discovery Miles 60 060
Pedagogy, Presence, and Motivation in…
Aaron Michael Perez, ?Enol Orakc?
Hardcover
Maximizing Information System…
Semir Ibrahimovi, Lejla Turulja, …
Hardcover
R3,933
Discovery Miles 39 330
Current Trends in Cybersecurity and…
Remberto Jimenez, Veronica E O'Neill
Hardcover
R7,648
Discovery Miles 76 480
|