![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
Learn How To Convert Web Data Into Web Knowledge This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid framework for mining the Web. The authors walk readers through the algorithms with the aid of examples and exercises. This text is divided into three parts: Part One, Web Structure, presents basic concepts and techniques for extracting information from the Web. Readers learn how to collect and index Web documents as well as search and rank Web pages according to their textual content and hyperlink structure. Part Two, Web Content Management, offers two approaches, clustering and classification, for organizing Web content. For both approaches, the authors set forth specific algorithms that enable readers to convert Web data into knowledge. Part Three, Web Usage Mining, demonstrates the application of data mining methods to uncover meaningful patterns of Internet usage. Methods and algorithms are illustrated by simple examples. More than 100 exercises help readers assess their grasp of the material. Further, thirty-four hands-on analysis problems ask readers to use their new data mining expertise to solve real problems, working with large data sets. All the data sets needed for the examples, exercises, and analysis problems are available on the companion Web site. The extensive use of examples, along with the opportunity to test and apply data mining skills, makes this text ideal for graduate and upper-level undergraduates in computer science andengineering. Web designers and researchers will find that this text gives them a new set of tools to further mine the Web for knowledge and move well beyond the capabilities of standard search engines.
A bundle of Apple services, all in one place All your favorite Apple services are available in one convenient bundle, and Apple One For Dummies helps you get the full value out of your subscription. What's in this Apple barrel? Everything you need to stream music and TV, keep up with the news, play games, store files online, and even stay in shape. This book gives you a bundle of insight on how to choose the subscription level that's right for you, access and link all the services across your Apple and non-Apple devices, and use all the fun features of each service. This book takes you inside Apple Music, Apple TV+, Apple News+, Apple Arcade, iCloud, and Apple Fitness+, showing you how to make the most of each one. Apple One For Dummies also shows you how to make changes at any time, so you get all the juice out of your subscription! Get access to 50 million songs on Apple Plus Discover how the all-new Apple Fitness+ can transform your workout routine Use iCloud to store your photos and videos Understand Apple One's subscription options and get the biggest bang for your buck For Dummies welcomes you to the Apple One-stop-shop that will make your digital life that much simpler.
The increasing importance of industrial services and rapid digitalization towards smart and remote services pose opportunities as well as challenges to the manufacturing sector. This book provides a holistic understanding of industrial service management and guides companies into building capabilities and management practices for smart and remote services. By combining insights from research and practice, it offers a unique perspective on the core and enabling activities of manufacturing companies for growth in the service business. In essence, the first part covers action-based research findings regarding service strategy, organizational design, service innovation, service sales, services operations, and customer relationship management together with insights into value networks. The second part introduces outstanding practices from leading manufacturing companies in industrial and smart services. The book concludes with a summary of key messages and recommendations to navigate the landscape of industrial and smart service management successfully.
This book presents selected examples of digitalization in the age of digital change. It is divided into two sections: "Digital Innovation," which features new technologies that stimulate and enable new business opportunities; and "Digital Business Transformation," comprising business and management concepts that employ specific technological solutions for their practical implementation. Combining new insights from research, teaching and management, including digital transformation, e-business, knowledge representation, human-computer interaction, and business optimization, the book highlights the breadth of research as well as its meaningful and relevant transfer into practice. It is intended for academics seeking inspiration, as well as for leaders wanting to tap the potential of the latest trends to take society and their business to the next level.
Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.
For organizations operating in a modern business environment, adopting the latest information technologies (IT) is of paramount importance. Organizational decision makers are increasingly interested in IT acquisition, constantly seeking the most advanced solutions in order to give their constituents a distinct competitive advantage. Managing Enterprise Information Technology Acquisitions: Assessing Organizational Preparedness provides leaders and innovators with research and strategies to make the most of their options involving IT and organizational management approaches. This book will serve as a critical resource for leaders, managers, strategists, and other industry professionals who must be prepared to meet the constant changes in the field of information technologies in order to effectively guide their organizations and achieve their respective goals.
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
This book is an essential tool written to be used as the primary text for an undergraduate or early postgraduate course as well as a reference book for engineers and scientists who want to quickly develop finite-element programs. Regarding the formulation of the finite element method, the book emphasizes the essential unity of all processes of approximation used in the solution of differential equations such as finite differences, finite elements and boundary elements. Computational aspects are presented in Maple. Three Maple packages were specially developed for this book and are included in a companion CD-ROM.
Enterprise Systems have been used for many years to integrate technology with the management of an organization but rapid technological disruptions are now creating new challenges and opportunities that require urgent consideration. This book reappraises the implementation and management of Enterprise Systems in the digital age and investigates the vital link between business processes, information technology and the Internet for an organization's competitive advantage and success. This book primarily focuses on the implementation, operation, management and integration of Enterprise Systems with fastemerging disruptive technologies such as blockchains, big data, cryptocurrencies, artificial intelligence, cloud computing, data mining and data analytics. These disruptive technologies are now becoming mainstream and the book proposes several innovations that organizations need to adopt to remain competitive within this rapidly changing landscape. In addition, it examines Enterprise Systems, their components, architecture, and applications and enlightens readers on the benefits and shortcomings of implementing them. This book contains primary research on organizations, case studies, and benchmarks ERP implementation against international best practice.
This book highlights the latest research articles presented at the second Digital Marketing & eCommerce Conference in June 2021. Papers include a diverse set of digital marketing and eCommerce-related topics such as user psychology and behavior in social commerce, influencer marketing in social commerce, social media monetization strategies, social commerce characteristics and their impact on user behavior, branding on social media, social media-based business models, user privacy and security protection on social media, social video marketing and commerce, among other topics.
Many people believe that Amazon s success is the direct result of a strong user shopping experience. This however is only part of the reason shy Amazon is the number one ecommerce company on the world for almost two decades. The real reason behind Amazon s success is that they have mastered the art of getting other people to market and sell for them. From affiliate partners that drive traffic, to online reviews and ratings where customers tell other customers why they should buy a product, to getting free publicity from shows like Oprah or 60 Minutes, Amazon is the online company to emulate. Amazon s Dirty Little Secrets" will show you how you can accomplish this for your company. "Amazon s Dirty Little Secret" is getting others to do their marketing and sales for them. This is so powerful that Greg created an acronym using the word POWER+. P Plenty of traffic O Offer something for free W Win their trust E Engaging experience R Request an action + additional tips & secrets Anyone engaged in Internet sales and marketing will benefit from the specific examples in this book."
Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides essential insight and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.
Power up your proficiency with this genius guide to popular Microsoft 365 apps Do you want to make your Microsoft 365 account a productivity behemoth? Do you want to squeeze every last bit of awesome from Word, Excel, and PowerPoint and learn a little more about Outlook, too? Microsoft 365 Portable Genius has got you covered. A seasoned tech expert and trainer, author Lisa A. Bucki shows you how to build Word documents, Excel workbooks, and PowerPoint presentations the right way, as well as how to use high-impact design techniques to make your documents pop. This book answers 11 key questions about how to make the most of Microsoft 365, providing genius tips as it leads you through the essentials. You'll learn how to: Tackle common skills like creating files, adding basic content, navigating in a file, making selections, copying and moving content, and saving files Build a new Word document by using outlining, bullets and numbering, columns, and other features for creating and enhancing content Enhance Excel workbook files by organizing data on different sheets, filling entries, creating range names, and entering powerful, accurate formulas Develop a PowerPoint presentation by choosing the right layout for each slide and adding content to placeholders, and then transform it into an on-screen show with transitions and animations Add punchy design and branding by using text formatting, themes, and graphics in your files Use lists, tables, and charts to make data easier to interpret Create, send, reply to, and organize email in Outlook, as well as add contacts Share file contents on paper or digitally Check out the Online Bonus Appendix at Wiley for more genius coverage of topics including additional Excel formula review techniques, essential Excel functions, theme colors and fonts changes, and WordArt Whether you have used Office in the past or are new to its subscription successor Microsoft 365, Microsoft 365 Portable Genius provides the expert guidance you need to work smarter in Microsoft 365.
This book offers a framework and analysis for the current technological landscape between the United States and China across the financial and insurance sectors as well as emerging technologies such as AI, Blockchain, Cloud and Data Analytics and Quantum Computing (ABCDQ). Based on original lecture slides used by the authors, the book presents contemporary and critical views of emergent technologies for a wide spectrum of readers from CEOs to university lecturers to students. The narrative aims to help readers upgrade their technology literacy and to overcome the fear of AI posed by our lizard brain.
This book offers a framework and analysis for the current technological landscape between the United States and China across the financial and insurance sectors as well as emerging technologies such as AI, Blockchain, Cloud and Data Analytics and Quantum Computing (ABCDQ). Based on original lecture slides used by the authors, the book presents contemporary and critical views of emergent technologies for a wide spectrum of readers from CEOs to university lecturers to students. The narrative aims to help readers upgrade their technology literacy and to overcome the fear of AI posed by our lizard brain.
This book discusses how technological innovations have affected the resolution of disputes arising from electronic commerce in the European Union, UK and China. Online dispute resolution (ODR) is a form of alternative dispute resolution in which information technology is used to establish a process that is more effective and conducive to resolving the specific types of dispute for which it was created. This book focuses on out-of-court ODR and the resolution of disputes in the field of electronic commerce. It explores the potential of ODR in this specific e-commerce context and investigates whether the current use of ODR is in line with the principles of access to justice and procedural fairness. Moreover, it examines the major concerns surrounding the development of ODR, e.g. the extent to which electronic ADR agreements are recognized by national courts in cross-border e-commerce transactions, how procedural justice is ensured in ODR proceedings, and whether ODR outcomes can be effectively enforced. To this end, the book assesses the current and potential role of ODR in resolving e-commerce disputes, identifies the legal framework for and legal barriers to the development of ODR, and makes recommendations as to the direction in which practice and the current legal framework should evolve. In closing, the book draws on the latest legislation in the field of e-commerce law and dispute resolution in order to make recommendations for future ODR design, such as the EU Platform-to-Business Regulation on Promoting Fairness and Transparency for Business Users of Online Intermediation Services (2019) and the United Nations Convention on International Settlement Agreements Resulting from Mediation (2018), which provide the legal basis for ODR's future development.
Developments in information communication technologies (ICTs) have altered the fabric of youth culture in terms of a young person's access to information and ability to communicate with a global audience. The conditions, opportunities, and limitations of using digital media are different for marginalized urban youth. In order to harness the educational value of digital media in the lives of disenfranchised youth, we must understand its potential as a means of empowerment. Central to this book is the development of a model for working with youth using ICTs called digital youth praxis (DYP), which offers praxis orientation of ICTs that are critical, creative, and grounded in social justice. This model includes three tenets: the DYP H3 model, used for understanding context and ICT creation practices; the DYP phases, which offers six phases for critical ICT making; and the DYP typology, which offers insight on three different levels of ICT engagement and what they include. The purpose of this model is to clarify concepts and propose interdisciplinary relationships among concepts, provide a context for interpreting the findings, explain observations and creative content, and to encourage theory development that is useful to practice. Providing insight based on community-based fieldwork with marginalized youth, the interdisciplinary nature of Digital Youth Praxis is an excellent guide for formal and informal educators interested or engaged in youth media productions.
We are facing a future of unbounded complexity. Whether that complexity is harnessed to build a world that is safe, pleasant, humane and profitable, or whether it causes us to careen off a cliff into an abyss of mind-numbing junk is an open question. The challenges and opportunities--technical, business, and human--that this technological sea change will bring are without precedent. Entire industries will be born and others will be laid to ruin as our society navigates this journey. There are already many more computing devices in the world than there are people. In a few more years, their number will climb into the trillions. We put microprocessors into nearly every significant thing that we manufacture, and the cost of routine computing and storage is rapidly becoming negligible. We have literally permeated our world with computation. But more significant than mere numbers is the fact we are quickly figuring out how to make those processors communicate with each other, and with us. We are about to be faced, not with a trillion isolated devices, but with a "trillion-node network" a network whose scale and complexity will dwarf that of today's Internet. And, unlike the Internet, this will be a network not of computation that we "use," but of computation that we "live in." Written by the leaders of one of America's leading pervasive computing design firms, this book gives a no-holds-barred insiders' account of both the promise and the risks of the age of Trillions. It is also a cautionary tale of the head-in-the-sand attitude with which many of today's thought-leaders are at present approaching these issues. "Trillions "is a field guide to the future--designed to help businesses and their customers prepare to prosper, "in" the information.
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)
The Unified Process methodology for object-oriented component-based development has taken the information technology community by storm. This first volume in a four-book series addresses the Inception Phase, in which developers focus on the initial requirements for a system, determining its scope and organizing the project. These articles from "Software Development" magazine have been written by industry luminaries.
This book describes how chief information officers (CIOs) can embrace and drive the digital transformation by providing innovative leadership that uses old skills in a novel way. The book explores ways in which new actors and factors will play a key role in this process and how new relations can be created among things, data, and people. In addition, the design of digital organizations and the implementation of digital technologies are carefully examined and it is explained how digital workspaces can be designed, organized, and used. A set of methods is provided for linking new digital tools in order to meet the goals and challenges of building a digital enterprise. The digital economy is disrupting the way of interaction within value chains, creating fresh spaces for competition and novel ecosystems. With the advent of social media networking, mobility, big data and cloud computing, 4.0 manufacturing, etc., we are witnessing the birth of new digital organizations. However, sharing of leadership of this change among different actors can create disorder and inefficiency. Against this background, the future role of the CIO will be crucial.
This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.
Learn to crunch huge amounts of data with PowerPivot and Power Query Do you have a ton of data you need to make sense of? Microsoft's Excel program can handle amazingly large data sets, but you'll need to get familiar with PowerPivot and Power Query to get started. And that's where Dummies comes in. With step-by-step instructions--accompanied by ample screenshots--Excel PowerPivot & Power Query For Dummies will teach you how to save time, simplify your processes, and enhance your data analysis and reporting. Use Power Query to discover, connect to, and import your organization's data. Then use PowerPivot to model it in Excel. You'll also learn to: Make use of databases to store large amounts of data Use custom functions to extend and enhance Power Query Add the functionality of formulas to PowerPivot and publish data to SharePoint If you're expected to wrangle, interpret, and report on large amounts of data, Excel PowerPivot & Power Query For Dummies gives you the tools you need to get up to speed quickly.
The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online. |
You may like...
Geometric Complex Analysis - In Honor of…
Jisoo Byun, Hong Rae Cho, …
Hardcover
R4,061
Discovery Miles 40 610
Generalizations of Thomae's Formula for…
Hershel M. Farkas, Shaul Zemel
Hardcover
R2,851
Discovery Miles 28 510
Teaching Strategies For Quality Teaching…
Roy Killen, Annemarie Hattingh
Paperback
R164
Discovery Miles 1 640
Mathematical Programming and Game Theory
S. K. Neogy, Ravindra B. Bapat, …
Hardcover
R2,667
Discovery Miles 26 670
|