![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
For organizations operating in a modern business environment, adopting the latest information technologies (IT) is of paramount importance. Organizational decision makers are increasingly interested in IT acquisition, constantly seeking the most advanced solutions in order to give their constituents a distinct competitive advantage. Managing Enterprise Information Technology Acquisitions: Assessing Organizational Preparedness provides leaders and innovators with research and strategies to make the most of their options involving IT and organizational management approaches. This book will serve as a critical resource for leaders, managers, strategists, and other industry professionals who must be prepared to meet the constant changes in the field of information technologies in order to effectively guide their organizations and achieve their respective goals.
This book is an essential tool written to be used as the primary text for an undergraduate or early postgraduate course as well as a reference book for engineers and scientists who want to quickly develop finite-element programs. Regarding the formulation of the finite element method, the book emphasizes the essential unity of all processes of approximation used in the solution of differential equations such as finite differences, finite elements and boundary elements. Computational aspects are presented in Maple. Three Maple packages were specially developed for this book and are included in a companion CD-ROM.
This book highlights the latest research articles presented at the second Digital Marketing & eCommerce Conference in June 2021. Papers include a diverse set of digital marketing and eCommerce-related topics such as user psychology and behavior in social commerce, influencer marketing in social commerce, social media monetization strategies, social commerce characteristics and their impact on user behavior, branding on social media, social media-based business models, user privacy and security protection on social media, social video marketing and commerce, among other topics.
Learn to crunch huge amounts of data with PowerPivot and Power Query Do you have a ton of data you need to make sense of? Microsoft's Excel program can handle amazingly large data sets, but you'll need to get familiar with PowerPivot and Power Query to get started. And that's where Dummies comes in. With step-by-step instructions--accompanied by ample screenshots--Excel PowerPivot & Power Query For Dummies will teach you how to save time, simplify your processes, and enhance your data analysis and reporting. Use Power Query to discover, connect to, and import your organization's data. Then use PowerPivot to model it in Excel. You'll also learn to: Make use of databases to store large amounts of data Use custom functions to extend and enhance Power Query Add the functionality of formulas to PowerPivot and publish data to SharePoint If you're expected to wrangle, interpret, and report on large amounts of data, Excel PowerPivot & Power Query For Dummies gives you the tools you need to get up to speed quickly.
Many people believe that Amazon s success is the direct result of a strong user shopping experience. This however is only part of the reason shy Amazon is the number one ecommerce company on the world for almost two decades. The real reason behind Amazon s success is that they have mastered the art of getting other people to market and sell for them. From affiliate partners that drive traffic, to online reviews and ratings where customers tell other customers why they should buy a product, to getting free publicity from shows like Oprah or 60 Minutes, Amazon is the online company to emulate. Amazon s Dirty Little Secrets" will show you how you can accomplish this for your company. "Amazon s Dirty Little Secret" is getting others to do their marketing and sales for them. This is so powerful that Greg created an acronym using the word POWER+. P Plenty of traffic O Offer something for free W Win their trust E Engaging experience R Request an action + additional tips & secrets Anyone engaged in Internet sales and marketing will benefit from the specific examples in this book."
This book offers a framework and analysis for the current technological landscape between the United States and China across the financial and insurance sectors as well as emerging technologies such as AI, Blockchain, Cloud and Data Analytics and Quantum Computing (ABCDQ). Based on original lecture slides used by the authors, the book presents contemporary and critical views of emergent technologies for a wide spectrum of readers from CEOs to university lecturers to students. The narrative aims to help readers upgrade their technology literacy and to overcome the fear of AI posed by our lizard brain.
This book offers a framework and analysis for the current technological landscape between the United States and China across the financial and insurance sectors as well as emerging technologies such as AI, Blockchain, Cloud and Data Analytics and Quantum Computing (ABCDQ). Based on original lecture slides used by the authors, the book presents contemporary and critical views of emergent technologies for a wide spectrum of readers from CEOs to university lecturers to students. The narrative aims to help readers upgrade their technology literacy and to overcome the fear of AI posed by our lizard brain.
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides essential insight and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
This book discusses how technological innovations have affected the resolution of disputes arising from electronic commerce in the European Union, UK and China. Online dispute resolution (ODR) is a form of alternative dispute resolution in which information technology is used to establish a process that is more effective and conducive to resolving the specific types of dispute for which it was created. This book focuses on out-of-court ODR and the resolution of disputes in the field of electronic commerce. It explores the potential of ODR in this specific e-commerce context and investigates whether the current use of ODR is in line with the principles of access to justice and procedural fairness. Moreover, it examines the major concerns surrounding the development of ODR, e.g. the extent to which electronic ADR agreements are recognized by national courts in cross-border e-commerce transactions, how procedural justice is ensured in ODR proceedings, and whether ODR outcomes can be effectively enforced. To this end, the book assesses the current and potential role of ODR in resolving e-commerce disputes, identifies the legal framework for and legal barriers to the development of ODR, and makes recommendations as to the direction in which practice and the current legal framework should evolve. In closing, the book draws on the latest legislation in the field of e-commerce law and dispute resolution in order to make recommendations for future ODR design, such as the EU Platform-to-Business Regulation on Promoting Fairness and Transparency for Business Users of Online Intermediation Services (2019) and the United Nations Convention on International Settlement Agreements Resulting from Mediation (2018), which provide the legal basis for ODR's future development.
Developments in information communication technologies (ICTs) have altered the fabric of youth culture in terms of a young person's access to information and ability to communicate with a global audience. The conditions, opportunities, and limitations of using digital media are different for marginalized urban youth. In order to harness the educational value of digital media in the lives of disenfranchised youth, we must understand its potential as a means of empowerment. Central to this book is the development of a model for working with youth using ICTs called digital youth praxis (DYP), which offers praxis orientation of ICTs that are critical, creative, and grounded in social justice. This model includes three tenets: the DYP H3 model, used for understanding context and ICT creation practices; the DYP phases, which offers six phases for critical ICT making; and the DYP typology, which offers insight on three different levels of ICT engagement and what they include. The purpose of this model is to clarify concepts and propose interdisciplinary relationships among concepts, provide a context for interpreting the findings, explain observations and creative content, and to encourage theory development that is useful to practice. Providing insight based on community-based fieldwork with marginalized youth, the interdisciplinary nature of Digital Youth Praxis is an excellent guide for formal and informal educators interested or engaged in youth media productions.
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)
We are facing a future of unbounded complexity. Whether that complexity is harnessed to build a world that is safe, pleasant, humane and profitable, or whether it causes us to careen off a cliff into an abyss of mind-numbing junk is an open question. The challenges and opportunities--technical, business, and human--that this technological sea change will bring are without precedent. Entire industries will be born and others will be laid to ruin as our society navigates this journey. There are already many more computing devices in the world than there are people. In a few more years, their number will climb into the trillions. We put microprocessors into nearly every significant thing that we manufacture, and the cost of routine computing and storage is rapidly becoming negligible. We have literally permeated our world with computation. But more significant than mere numbers is the fact we are quickly figuring out how to make those processors communicate with each other, and with us. We are about to be faced, not with a trillion isolated devices, but with a "trillion-node network" a network whose scale and complexity will dwarf that of today's Internet. And, unlike the Internet, this will be a network not of computation that we "use," but of computation that we "live in." Written by the leaders of one of America's leading pervasive computing design firms, this book gives a no-holds-barred insiders' account of both the promise and the risks of the age of Trillions. It is also a cautionary tale of the head-in-the-sand attitude with which many of today's thought-leaders are at present approaching these issues. "Trillions "is a field guide to the future--designed to help businesses and their customers prepare to prosper, "in" the information.
The Unified Process methodology for object-oriented component-based development has taken the information technology community by storm. This first volume in a four-book series addresses the Inception Phase, in which developers focus on the initial requirements for a system, determining its scope and organizing the project. These articles from "Software Development" magazine have been written by industry luminaries.
This book describes how chief information officers (CIOs) can embrace and drive the digital transformation by providing innovative leadership that uses old skills in a novel way. The book explores ways in which new actors and factors will play a key role in this process and how new relations can be created among things, data, and people. In addition, the design of digital organizations and the implementation of digital technologies are carefully examined and it is explained how digital workspaces can be designed, organized, and used. A set of methods is provided for linking new digital tools in order to meet the goals and challenges of building a digital enterprise. The digital economy is disrupting the way of interaction within value chains, creating fresh spaces for competition and novel ecosystems. With the advent of social media networking, mobility, big data and cloud computing, 4.0 manufacturing, etc., we are witnessing the birth of new digital organizations. However, sharing of leadership of this change among different actors can create disorder and inefficiency. Against this background, the future role of the CIO will be crucial.
This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.
The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.
This book describes the intrinsic factors of IT Operation and its set-up during the software implementation phase. Based on the author's long-term experience in managing IT for more than 100 clients over nearly 25 years, the book examines the needed knowledge and execution management capabilities to implement and run IT environments successfully for all sizes of enterprises. Many real-world examples provide insight into typical IT challenges and recipes to turn common pitfalls of implementation and operation into best practices. In order to dominate information technology and not be dominated by it, readers will understand how to identify the most common risk factors during implementations and how to initiate successful risk-mitigation measures. The goal of this book is to arm the reader to completely prevent The 5 Pitfalls of Software Implementation by using the right programmatic design and execution. After an introduction to the book, individual chapters examine the vision of a Perfect IT and how Design Thinking and innovation contributes to it. The core chapters conveys The Five Pitfalls of Software Implementation, including Underestimation of System Performance Issues, Weak Program Governance and Leadership, and Operational Un-Readiness. The challenges surrounding implementations of cloud applications, are presented separately. Final chapters describe the preparation of the IT Operation along with a number of dos and don'ts (i.e. 'Best Practices' and 'Worst Practices'). The book concludes by presenting some Digital Strategies of companies, to dominate information technology.
Agent technology has recently become one of the most vibrant and fastest growing areas in information technology. And advanced digital communicatiion is a central enabling technology for the coming information society. So software agents and their exploitation for future communication systems are attracting particular attention from the research and development community as well as from economic and user communities interested in everyday private and professional digital communication applications. This monograph-like anthology is the first systematic introduction to software agents and future communication systems. Fifteen coherently written chapters by leading software agent researchers provide complementary coverage of the relevant issues. Multi-agent systems and mobile agent approaches are presented in a well-balanced way and applied to most important topics in future communication systems. In addition, the volume editors have provided a detailed introductory survey chapters.
When traditional web development techniques don't cut it, try React. Use React to create highly interactive web pages faster and with fewer errors. With a little JavaScript experience under your belt, you'll be up and running in no time creating dynamic web applications. Craft isolated components that make your apps easier to develop and maintain, with plenty of guidance on best practices. Set up automated tests, and make pages render fast for your users. See how to use your React skills to integrate with other front-end technologies when needed. Dive right into React by defining components, the basic building blocks of a React application. Integrate modern JavaScript language features such as classes and arrow functions in your app. Analyze the relationships in your data to isolate state, and sync the data model with what your users see. Once you're familiar with how a React application works, organize your code base with modules. Configure a production build and deliver your app as efficiently as possible with Webpack. Master testing with React-specific advice and tools to catch the most bugs with the least amount of code. Learn the basics of the Redux library. Define actions and manage an immutable central state with reducers, then connect Redux to your React components to build even larger and more complex interfaces. Package your React code as a standalone widget so anyone can use it in their own applications. Reuse existing JavaScript code in your React components, and build a new React view on top of an existing data model shared with a legacy application. When you finish this book, you'll be well on your way to solving your front-end problems with React. What You Need: Node.js 6.x or later, and a modern web browser
This practical book presents a proven decision-making process to help IT and business managers select the off-the-shelf software product that best fits the needs of their organisation, whether in the commercial or public sector. Offering a structured approach to managing stakeholders, requirements and candidate IT vendors, this practical 'how-to' guide will help deliver a rigorous, defensible decision within an aggressive timescale.
The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.
Companies understand that their ability to compete is tied directly to their ability to leverage the very latest technology advances. Fortunately, deploying new technology has never been easier, primarily due to early maturity and cloud delivery. One approach that is helping companies rapidly pilot and affordably deploy new technologies is ready technology, a new category of information technology (IT). This book explains the ready technology adoption process in detail, enabling companies to exploit new technology immediately and effectively. In this book, the author challenges the traditional "requirements-first/technology-second" approach to technology deployment. Espousing a "technology-first/requirements-second" approach, the author explains how business solutions are "discovered" by deploying-not studying-ready technology. The book covers the latest trends and processes in ready technology. It also describes the characteristics of ready companies and recommends ready technology pilots that should be launched by the following industries: higher education, retail, and healthcare.
This timely edited collection offers a multidisciplinary perspective on social commerce, a phenomenon that has gained increasing interest over the last 8 years. Investigating how social media can be used to generate value for brands beyond customer relationship purposes, the skilled authors explore how social media users co-create value for businesses, influence other consumers and generate electronic word-of-mouth (eWOM). Providing insights from practitioners and academics, this book goes further than simply exploring e-commerce and social media, and addresses the real relevance of social commerce in today's business landscape. With a selection of contemporary case studies and a Foreword written by Inthefrow's creator, Victoria Magrath, Social Commerce will be an engaging read for those studying consumer behaviour, online marketing, and e-commerce. |
You may like...
Introductory Dynamical Oceanography
Stephen Pond, George L. Pickard
Paperback
R1,346
Discovery Miles 13 460
Fundamentals of Enhanced Oil Recovery…
Dheiaa Alfarge, Mingzhen Wei, …
Paperback
R3,435
Discovery Miles 34 350
Interpretation of Micromorphological…
Georges Stoops, Vera Marcelino, …
Paperback
Meso-Cenozoic Brazilian Offshore…
Anderson Costa Dos Santos, Peter Christian Hackspacher
Paperback
R3,061
Discovery Miles 30 610
Proceedings of the American Association…
Assoc for the Advancement of Science
Hardcover
R732
Discovery Miles 7 320
Petroleum Related Rock Mechanics, Volume…
Erling Fjaer, Rune Martin Holt, …
Paperback
R3,965
Discovery Miles 39 650
The Role of Submarine Groundwater…
Beata Szymczycha, Janusz Pempkowiak
Hardcover
R3,236
Discovery Miles 32 360
|